• There’s one common desire that allows you to be taken advantage of or to be manipulated that leaves you wanting to kick yourself for not doing one simple thing to prevent it. Today’s guest is Mark Edward. Mark is a professional mentalist who has specialized in magic of the mind for over 35 years. He travels internationally as a skeptical activist using his skills as a mentalist to teach and promote critical thinking.

    Show Notes:

    [1:01] - Mark shares his interesting background in magic and as a mentalist.

    [4:03] - As a starving artist, Mark formed a group with other magicians and began street performing.

    [6:33] - If people want to believe in it, it’s mentalism.

    [8:09] - When working as a medium, Mark learned about people’s desire for things to be true.

    [11:41] - Mark describes the 900 years where people could call psychics on the phone.

    [15:27] - After his years in the field, Mark wrote a book.

    [17:42] - Mark shares his experience moving over into the skeptic community.

    [20:20] - Scams are like magicians because it’s all manipulation and performance.

    [24:35] - In some cases, Mark investigated people who claimed to be able to do something that genuinely believed they could.

    [28:14] - Don’t be fooled by those who know things about you. A lot of things can be determined through observation.

    [29:13] - These days there are Zoom calls for sessions with psychics and they have the internet at their fingertips to search for information.

    [31:08] - Mark explains what a pre-show is and some of the ways to manipulate getting information ahead of time.

    [33:19] - What is the difference between a mentalist and a psychic?

    [37:28] - No matter what you know, you can still fall for things if you really want to believe them.

    [40:40] - Generally speaking, most Americans don’t want to be told the truth, but rather be told what they want to hear.

    [42:44] - Manipulation is the lowest form of humanity.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page


    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Mark Edward’s Website

    Psychic Blues by Mark Edward

  • After being scammed, embarrassment can prevent people from getting the help they need, but in order to destigmatize the painful mistake, more people need to report incidents and understand that it happens to even the most technically savvy.

    Today’s guest is Rory Innes. Rory has spent his entire career in cybersecurity and has worked for leading global cybersecurity companies in a range of senior management positions. Rory spotted the huge gap in support for victims of cybercrime and online harm and created the Cyber Helpline to mobilize the cybersecurity community to step in and fill the gap. As CEO, Rory is responsible for the strategic, direction, performance, and operational effectiveness of the Cyber Helpline. Rory often provides comment and opinion for the press and has appeared on live TV and documentaries providing his expert opinion on cybercrime.

    Show Notes:

    [1:10] - Rory shares what Cyber Helpline is and his motivation to start it up.

    [3:26] - There are different types of cybersecurity such as commercial issues and personal concerns.

    [4:31] - Now, Cyber Helpline sees an average of 2,000 reports a month.

    [5:53] - Cyber Helpline began as a UK only organization, but they are now looking to help globally.

    [7:11] - Rory shares the types of things reported and the things that have been surprising over the last five years.

    [8:35] - In many places across the world, Covid-19 had a huge impact on the economy and the rise of scams.

    [10:46] - Hacked social media accounts are really common and can be really detrimental to the people in your network.

    [12:00] - Investment scams are also very commonly seen and you may not see the problem for a while.

    [14:43] - Hypervigilance from the threat of cyberstalking makes things mentally draining, scary, and creates difficulty for them to be believed.

    [16:36] - Rory describes the process of investigating and helping a victim through a cyberstalking case.

    [19:50] - Misconceptions are created and then spread wide through crime stories, social media, and crime shows or movies.

    [22:46] - Does changing your password and wiping your devices really help?

    [24:24] - When it comes to cyberstalking, it is important to remember that stalkers are obsessed. If you remove the access, you don’t remove the obsession.

    [26:51] - The Cyber Helpline also helps educate the victim in how to spot signs of scams.

    [28:00] - The Cyber Helpline uses the Assistance Self-Help model.

    [31:30] - Service users are asked how this experience is impacting them.

    [32:59] - Mental health is the highest reported impact on victims, even more so than money.

    [35:31] - Mental health support is getting better, but is still not effective for many people who experience this.

    [37:32] - The demographics of the victims can tell a lot about the likelihood of them reporting something.

    [40:27] - Rory himself has been a victim of cybercrime and admits that he was very embarrassed by it at the time it happened.

    [43:41] - The hardest thing is when targeted children and teens don’t feel comfortable talking about it with their parents.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page


    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    The Cyber Helpline

  • Estão a faltar episódios?

    Clique aqui para atualizar o feed.

  • Scamming is a multi-billion dollar industry that is creative and evolving. The National Consumer Protection Week is geared toward education and the National Slam the Scam Day focuses specifically on government imposter scams. Today’s guest is Anthony “AJ” Monaco. AJ currently serves as a special agent in charge of the major case unit at the Social Security Administration Office of Inspector General. His unit investigates complex fraud cases with a particular emphasis on Social Security Administration imposter scams and organized fraud rings. AJ has over 30 years of combined federal law enforcement, Marine officer, and legal experience.

    Show Notes:

    [1:00] - AJ shares his current role and what he manages at the Social Security Administration.

    [2:59] - The Secret Service is also a leader in financial fraud.

    [4:01] - Government imposter fraud is when a scammer presents themselves as a government official, specifically from the Social Security Administration.

    [6:04] - Scams evolve the way business evolves. Scammers take notice of human nature.

    [7:56] - Scammers pay great attention to everything including social media and the news.

    [9:09] - Sometimes these government imposter scammers will present fake credentials but real officials won’t send credentials through text or email.

    [11:02] - Scammers have shifted back to physical mail because that is generally the way the government contacts you.

    [13:21] - You can report calls from phone numbers that you suspect are fraudulent.

    [14:26] - For any phone call or text you get, do a search online to see if there’s anything that the phone number comes back as.

    [16:50] - If you get physical mail, there will be some minor things that could stand out as suspicious.

    [19:39] - Once scammers get past your initial barriers, they are easier to believe.

    [20:40] - The 4 P’s are the “Phony Phundamentals” and they are Pretend, Problem, Pressure, and Pay.

    [22:01] - When it comes to the Pay step, scammers will ask for money in a way that is not standard for sending money to a real government official.

    [25:37] - Gift card scams seem like they wouldn’t be easy to fall for, but once a scammer gets past the barrier, it is easier to convince targets.

    [28:01] - Purchasing and sending gift cards are almost impossible to trace.

    [30:09] - AJ describes a recent organized crime ring that they were successful in shutting down.

    [32:58] - How likely will a victim of fraud get their money back when investigated by the Social Security Administration?

    [36:02] - Be suspicious if someone reaches out to tell you that they will be able to get your money back.

    [39:40] - AJ explains what Slam the Scam Day is.

    [41:09] - National Consumer Protection Week is this week and Slam the Scam Day is soon!

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page


    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    National Consumer Protection Week: Slam the Scam Day

  • Have you ever Googled yourself to see what information is available about you? Knowing how to remove some of your private information or negate the impact of a negative review can make a big difference to your personal or professional reputation.

    Today’s guest is Darren Dunner. Darren is a digital marketing and SEO guru with a track record of results-driven leadership. As Net Reputation’s VP of Reputation Management Operations, he provides expert insight and mentorship needed to consistently prove and optimize deliverables. He helps people and companies protect and correct their online reputation.

    Show Notes:

    [1:04] - Darren shares his background and what his current role is in Reputation Management.

    [3:44] - If you follow their guidelines, Google can follow and understand what you are trying to accomplish.

    [4:53] - Online reputation for a company could be reviews, information in articles, blog posts, or videos.

    [6:04] - Posts without consequences in mind can be detrimental.

    [8:28] - Darren and Chris describe a scenario of someone needing to do damage control.

    [10:19] - Negative sentiments are click bait and move through Google faster.

    [12:09] - There’s a lot more impact for public figures due to notoriety.

    [13:06] - Digital marketing and reputation management is surprisingly complicated.

    [13:58] - Reputation management takes a long time, usually at least more than a year.

    [15:52] - Darren lists some of the things he does to help manage reputation and how much work it really is.

    [17:46] - Life online means that other people find out about what is going on in your life and that could have both good and bad consequences.

    [19:07] - Darren’s advice is to only focus on putting out positive things online.

    [20:01] - Searches are geo targeted so your search results will be different than someone searching the same thing in a different location.

    [21:44] - For a company, it is important to have enough things out there that are connected properly to Google so your page is top in searches.

    [24:01] - Location is important to keep in mind for potential customers or clients to search.

    [25:18] - Darren explains a situation with a negative piece used in email marketing that brought up a huge uproar.

    [27:29] - You can catch things ahead of time as long as you prepare for it.

    [29:14] - You can’t always prepare for a bad review, but train employees and team members that things they do can be used against them and the company.

    [32:44] - Two factor authorization is crucial to keep your assets protected.

    [34:00] - No one you know will ever ask you for any authentication code.

    [35:07] - If you have a social media account, use it. Don’t let it sit unused.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page


    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest


  • Taking a proactive approach versus a reactive approach to cybersecurity makes a big difference for the stress levels of employees and customers. The daily conversations that take place with management can change the impact of a ransomware attack remarkably.

    Today’s guest is Robert Anderson Jr. Robert is a national security expert, author, and business leader dedicated to helping companies improve cybersecurity and reduce business risk. As Chairman and CEO of Cyber Defense Labs, he brings decades of executive leadership and operational experience in cybersecurity, counterintelligence, economy espionage, and critical incident response.

    Show Notes: [0:57] - Robert describes his current role as CEO of Cyber Defense Labs and his background in the FBI. [2:14] - The plan for Robert going into cybersecurity evolved over the decades of his career as a direct result of the evolution of how crime is committed. [3:52] - Anything you can do before something bad happens is the best thing for your company. [4:42] - Once a breach happens, it goes beyond inconvenience and risk for clients. It could mean the end of a business. [7:01] - In Robert’s experience, most companies have a plan but the plan hasn’t been tested and doesn’t hold up to an actual data breach. [9:01] - Robert describes scenarios while working in the FBI in companies choosing to pay ransoms after being hit with ransomware. [11:10] - The larger the company, the more complicated this becomes. [12:50] - Breaches have changed in recent years and now ask for millions of dollars. [14:45] - Chris and Robert recommend approaching practicing for possible breaches like fire drills. [17:03] - Robert advocates for being informed and understanding all laws when getting involved with ransomware. [18:57] - The reason why ransomware is so prevalent is it's a trillion dollar industry. Bad guys are making a lot of money. [21:26] - Hacking ability or high level hacking is not necessary to perform a breach anymore. [23:10] - Skilled hackers make even more money because they are often contracted for jobs. [24:36] - Robert believes there should be a global set of norms similar to the UN when it comes to what the world will tolerate when it comes to cybersecurity. [27:30] - The first call a company makes is not for help. It’s for mitigation. [29:18] - In Robert’s organization, cybersecurity is a daily conversation. [32:03] - Robert will not open a single email if he does not know who it is from. [34:10] - Logging onto public wifi can be dangerous. [35:55] - Your frontline of your company is made up of your employees. Educate them. [37:58] - You must have an internal and external communication plan. [39:31] - What are three things you can do after a breach? [42:31] - Chris gives an example of proper communication from a company that included their proactive approach and a timeline. [45:32] - Communicating with customers is important but it is equally as important to communicate with your team. [46:36] - When it comes to class action lawsuits, nowadays, even employees can sue the company.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cyber Defense Labs Website
  • Scammers are creatively trying to deceive and manipulate Amazon customers by getting them to do activities outside the Amazon ecosystem through texts, emails, and phone calls. Hopefully by looking at how the top scams are implemented, we can create more awareness and prevent loss.

    Today's guest is Abigail Bishop. Abigail is the Head of External Relations for Scam Prevention at Amazon, where she leads the organization’s outreach work to protect customers from falling victim to scams globally.

    Show Notes: [0:56] - Abigail shares her background and what she does at Amazon as the Head of External Relations for Scam Prevention. [2:46] - Her background was originally in Public Affairs so her path to her current role in scam prevention is non-traditional. [3:50] - There are over 12,000 employees behind the scenes at Amazon that work on scam prevention. [5:32] - Working across borders to find perpetrators is extremely difficult and sometimes impossible. [6:32] - Over 50% of the scams reported to Abigail’s team are order confirmation scams. [7:41] - Gift card scams continue to be common. Amazon will never ask you for payment in gift cards. [9:04] - Amazon will never ask you to install an app or allow them to access your computer. [10:30] - Verify any purchases on your Amazon account and report any malicious communication to Amazon’s message center. [12:46] - If you are ever contacted about Amazon for any reason, they will be able to verify all information and you can cross verify it on your account. [14:20] - You can always reach out to Amazon’s report a scam to verify any interaction you’ve had. [15:45] - Amazon is driven to protecting all Amazon users. [16:48] - Amazon Scam Prevention also sends out emails and information to help educate consumers on best practices. [18:01] - Abigail describes some of the steps that they have taken at Amazon to offer customers validation that any contact from them is legitimate. [19:05] - In 2022, over 20,000 phishing sites were found and shut down as well as over 10,000 phishing phone numbers. [24:01] - Current events play a role in when and how scammers approach their attacks. [25:21] - Because of the size and popularity of Amazon, they have the opportunity to act swiftly and cooperatively with other entities. [28:13] - Abigail shares what Amazon has been able to develop in cooperation with BBB and other corporations publicly. [30:30] - Amazon does have processes in place to help mitigate damage or prevent entirely data breaches. [32:41] - The scam reporting feature on Amazon is new within the last year. They rely heavily on consumers reporting for them to be able to track scams. [35:10] - Because of the volume of scam attempts, especially through text and email, many consumers don’t have time or desire to report every single one and would rather delete and ignore. [37:17] - What scams should be reported or prioritized to report? [39:14] - Always check your account directly on Amazon.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Report a Scam to Amazon BBB Scam Tracker Help Identifying a Scam
  • We like to think that we’re too smart to be taken advantage of by a scammer, but some are willing to invest a tremendous amount of time and effort for a payout. Many do not come forward because of the fear, shame, and victim-blaming, but that’s not true with today’s guest.

    Today’s guest is Ayleen Charlotte. Ayleen was one of the women featured in the Netflix documentary The Tinder Swindler. She made a radical choice between victimhood or becoming a beacon of female empowerment. After what became five years of misery, she decided not only to tell her story, but to make a lifelong entrepreneurial dream come true.

    Show Notes: [1:20] - When Ayleen contacted, there were already other women victimized, but Ayleen was a big part of the Tinder Swindler’s arrest. [2:49] - She had three goals that participating in the documentary helped achieve. [4:27] - Ayleen met this scammer five years ago and started a relationship with him. [5:19] - Because he claimed to have many enemies, he moved in with Ayleen and used her money and credit cards to “stay under the radar.” [6:58] - The lavish lifestyle he lived made sense with the story he provided to the women he victimized. [8:15] - One indicator that something was wrong was that money given back to her in the form of a check would never go through. [9:40] - He always had an operation to start and Ayleen took several personal loans to help with these endeavors. [11:27] - He laid a foundation of trust with the small things. [13:15] - Ayleen says that in the beginning, he really made her feel special. The development of the relationship was going well and very believable. [14:18] - There is a big difference between this situation and other types of fraud, as there was a real relationship built. [16:15] - The Tinder Swindler used the same stories over and over again with every victim. [17:08] - Even when he had “interactions” with enemies, he would show up with real injuries. [18:15] - Some of the people on his team did not know they were part of this, although Ayleen says his bodyguard and his right-hand were aware. [19:51] - An article was released about him and Ayleen saw it and immediately knew. [21:18] - Ayleen lists some of the reasons he gave for the article being released. In this instance, Ayleen trusted the article over him. [22:43] - When he continued to ask for money, Ayleen was in contact with the police. She wound up tricking him and, in a way, taking some of her money back. [25:58] - If Ayleen didn’t give him money, he made it clear that she would be in danger from his enemies. [27:18] - If someone is asking you for money and trying to push you, take a step back, shut down your phone, and think about it for a few days. [28:38] - Over time, Ayleen saw a change in character, especially when she stopped sending him money. [30:44] - The Tinder Swindler started his fraud schemes at the age of 15 and did not only target women. He swindled men as well as organizations and charities. [32:26] - He is not able to get a real job or career at this point. This is the only thing he can do and he will continue. He is still out there, living in Israel. [33:50] - The documentary has helped in slowing his scam. [35:39] - Ayleen’s trust of other people has not been impacted. She knows that she has experienced the worst already. [37:29] - Ayleen says the best thing you can do in a situation like this is to talk about it.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest
  • Pending legislation mandating cybersecurity representation at the top levels of an organization in a relatively young field and understanding that field are testing the bounds of practical cybersecurity leadership.

    Today’s guests are Richard Brinson and Rachel Briggs. Richard is an experienced executive, board advisor, and global top 100 Chief Informations Security Officer. He has been providing strategic guidance to many of the world’s largest global organizations for over 20 years with core expertise in cybersecurity, technology infrastructure, and enterprise architecture. Richard leads Savanti’s cybersecurity practice, helping large organizations to transform and modernize their security functions for the digital age.

    Rachel is a leading expert on security and has advised governments and multinational corporations on security, resilience, terrorism, and responses to extremism. She is an Executive Advisor with Savanti and founder and CEO of The Clarity Factory, which provides and arranges services to its clients including research, consultancy, and thought leadership.

    Show Notes: [1:35] - Richard shares his background and what Savanti is known for. [2:30] - Rachel works with Richard and his team on thought leadership products. [4:01] - Organizations reach out to Savanti and don’t know if what they are doing is right or wrong. SISOs seemed to be coming and going. [5:35] - There were 6 key factors that were causing this churn in the industry. [6:50] - The supply in demand problem for cybersecurity leaders is one issue in retaining professionals as SISOs. [8:45] - For every three years, a company is really only moving forward one. [10:05] - Rachel shares data that shows the importance of strong cybersecurity and leadership that does it right. [12:37] - It’s not just about security. It’s actually part of a good business model now. [14:03] - When cybersecurity isn’t a part of leadership, the board's understanding creates a problem with delegating and solving problems. [15:20] - Richard is a board advisor on many organizational boards to help with this lack of understanding. [16:48] - There are fewer than 100 SISOs with effective boardroom expertise. [18:02] - When speaking with SISOs and others in leadership, things are lost in translation. [20:28] - We tend to just expect people to be good communicators but it is a skill that needs to be trained. [21:43] - There are leadership training companies that organizations can work with to coach a leadership team. [23:30] - SISOs can and should be taught to communicate effectively in the boardroom and that should be something the organization provides. [25:20] - There is pending legislation that will mandate the requirement of cybersecurity in leadership, but Richard shares some possible problems. [27:04] - Savanti helps demystify this problem with communication. [28:42] - For smaller companies who cannot afford a full time SISO, fractional SISO roles that are usually virtual are offered by Savanti. [31:18] - If an incoming SISO does not have the support of the board, they cannot be effective or successful. [32:50] - The turnover rate for this role is quite high. [34:02] - Companies who aren’t willing to implement recommendations or bring in a qualified SISO leads to a number of costs and risks. [36:02] - Changing SISOs so often is destabilizing. [37:35] - With solid security, a company can take more business risks safely. [40:03] - Regulations can be helpful but not helpful in many ways. [41:52] - If you are considering a role as a SISO in leadership, round yourself off as a business leader with effective communication skills. [43:53] - You can read the recent report that Richard describes by clicking here.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Future of Cyber Security Leadership Series Savanti Website Richard Brinson on LinkedIn Rachel Briggs on LinkedIn
  • Millions have been impacted by data breaches. Many of us know how fraudsters work and how they utilize this information. But our parents and children become victims because of their fear or urgency inflicted by the scammers. Today’s guest is Mike Cook. Mike is an entrepreneur with over 30 years of experience working and serving in the financial services, wireless, cable/satellite, and auto financial industries. He has built several data breach applications in compliance, manual verification, and account management solutions.

    Show Notes: [0:56] - Mike shares his background and what he currently does. [2:10] - When Mike talked to a fraudster who stole cars, he immediately became interested in fraud and scams. [3:47] - Mike’s daughter was a victim of a scam and lost a lot of money, but the biggest impact was how fearful she was. [6:20] - In years past, fraud was easier to stop, but now everyone’s data is available somewhere online. [8:04] - Once data is breached, that information can be copied and sold over and over again. [9:30] - What is a citizen fraudster? [11:01] - Lenders and consumers are both heavily impacted by data breaches. [12:31] - As a consumer, you need to listen to every word. If it sounds too good to be true or too scary and urgent, it’s a scam. [14:08] - It is so easy to click on things without thinking about it. [15:19] - Don’t ever feel bad about choosing not to give someone information. [16:57] - When the economy goes down, fraud goes up. [18:55] - Fraud has never been harder to stop, has never been smarter, never been swifter to change patterns. It is on fire right now. [20:04] - Covid resulted in everyone moving to remote working, learning, and everything being online. It expedited the growth in fraud. [21:22] - Fraud is easier to commit online in a faceless environment. [23:46] - Mike is optimistic about upcoming policy changes. [25:18] - What is synthetic fraud and what are the impacts for consumers? [26:44] - There are ways to create a false identity to get through defenses and commit fraud. [28:21] - Synthetic fraud can get through but isn’t as hard to stop. [29:42] - Stopping fraud for consumers is a huge balancing act for organizations. [31:47] - Chris shares a story that shows the work that banks are doing to help mitigate fraud. [34:06] - We are going to see a lot more confirmation from organizations, especially financial institutions, to be sure you are not being scammed. [37:19] - There are several things we can do to make sure our kids don’t experience credit fraud by way of someone using randomly generated numbers. [40:21] - There are definitely other legislation needed to protect people from theft and fraud. [42:08] - Things that are being done in credit repair need to change in order to protect people. [43:58] - The government and the industry work together. [45:21] - Over time, fraud trends change. They follow whatever the fastest way to take money is. [46:19] - Synthetic fraud is unique in that all of it is completely fake.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Mike Cook on LinkedIn Socure Website
  • With AI having the ability to search the internet and write a paper, create an image, or even a video having someone say what they didn’t say, we can no longer use the phrase that seeing is believing. Today’s guest is Peter Sisson. As a serial entrepreneur with a master’s in AI from Stanford, Peter is working to fight fake news, fake reviews, and fake products. Misinformation and polarization have exploded since Peter began his career in Silicon Valley more than 20 years ago and his latest company CertifyIt offers an app that can help stop it.

    Show Notes: [1:08] - Peter shares his background in AI and as a serial entrepreneur. [3:01] - We believe what we see and it is already getting hard to determine what is real. [4:38] - The biggest concern is faking videos and faking images is already happening. [6:04] - The technology isn’t there yet and usually you can tell when an image or video is fabricated. [7:55] - AI has been trained by the entire internet. AI can write anything you want it to, but none of it is original. [9:18] - AI doesn’t actually know anything. It uses what is already available to learn patterns. Peter explains how it works. [11:25] - There are a lot of ethical concerns about using AI to create content. [12:51] - News providers use CertifyIt to know that content they release is accurate before they break fake news. [14:08] - Peter shares the story of CNN breaking news that wasn’t true but really appeared to be accurate. [16:16] - How does CertifyIt use metadata to confirm accuracy? [18:07] - Chris and Peter discuss some examples of how people need to use CertifyIt, which is a public benefit corporation. [21:01] - It is a simple concept, but it works and is a viable solution to ensure content is accurate. [22:25] - The sooner the video is determined to be true, it is news that can be broken faster. [23:46] - Fake reviews are a big problem right now where people are even hired to write them for companies or products. [26:21] - Certified location videos could be beneficial for certain products or services. [27:50] - A third party like CertifyIt is necessary as people won’t believe the vetting if it’s done by the news organization. [30:16] - You can trick people’s brains pretty easily as we are designed to believe what we see. This is especially easy if the viewer is tired or distracted. [31:50] - The more people get fooled, the more they will need a tool to vet the accuracy of a video they view. [33:29] - There will be false positives and false negatives as the technology gets better and better. [35:54] - The things that AI can create are truly very cool and can be entertaining, but the way people use it will change and probably not for the greater good. [38:21] - It will be possible to create alternate realities that are very convincing. [39:23] - It will probably take something major happening to bring this problem to light for the general public. [41:03] - The CertifyIt app can be used in a multitude of ways to provide a sense of confidence that the content you are viewing is true.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest CertifyIt Website CertifyIt on Apple App Store
  • Thank you for tuning in to our 150th episode! I started the Easy Prey Podcast with the goal of helping listeners learn to avoid being an easy target for scammers and fraudsters, both online and in the real world. Since the first episode on March 18, 2020, I’ve had the honor of interviewing some of the most influential people in their fields. We’ve talked about topics ranging from personal safety, self-defense, social engineering, and romance scams, to phishing, cybercrime, and everything in between. This episode is a slightly different format than normal. We’ve had some amazing guests on the show over the last 149 episodes. Today, I’m sharing highlights from our top 10 episodes!

    In this highlight episode, you’ll hear clips from:

    Narcissist Specialist, Dr. Ramani Durvasula Romance and Scam Survivor, Debby Montgomery Johnson Trust and Safety Architect, Jane Lee Programmer, John McAfee Author and UnMarketing Specialist, Scott Stratten People Hacker, Jenny Radcliff Former Cybercriminal, Brett Johnson Author and Gaslighting Expert, Dr. Deborah Vinall Former FBI Negotiator, Chris Voss Tech Pioneer and Podcast Host, Steve Gibson Show Notes:

    [1:50] - Dr. Ramini Durvasula is an expert in understanding Narcissism. She shares the shocking traits of narcissists and you may realize you know a few.

    Click HERE for the full episode with Dr. Ramini Durvasula.

    [9:49] - Debby Montgomery Johnson was a victim of an online dating scam. She shares how she was drawn in and what red flags you should look out for.

    Click HERE for the full episode with Debby Montgomery Johnson.

    [16:31] - Jane Lee went undercover to learn about the new online dating scam known as Pig Butchering. She explains how Pig Butchering works and what to look out for.

    Click HERE for the full episode with Jane Lee.

    [23:34] - John McAfee worked hard to stay hidden while he was on the run from the US government. He shares the unexpected costs of privacy.

    Click HERE for the full episode with John McAfee.

    [30:29] - As a former salesman, Scott Stratten knows that people can see through sketchy sales techniques. He talks about the advantage of doing business with people you know, like, and trust.

    Click HERE for the full episode with Scott Stratten.

    [36:37] - Hacking isn’t just for computers. Jenny Radcliff’s hacking specialty is hacking people. She shares how people can be manipulated and how your business or family can be compromised.

    Click HERE for the full episode with Jenny Radcliff.

    [45:41] - As a renowned cybercriminal, Brett Johnson helped define cybercrime as we know it. He now uses his experience to protect people from the type of person he used to be.

    Click HERE for the full episode with Brett Johnson.

    [52:01] - Gaslighting is a term that many of us have heard but not all of us know how to recognize. Dr. Deborah Vinall explains what it is and what to do when it happens to you.

    Click HERE for the full episode with Dr. Deborah Vinall.

    [57:16] - As a former international kidnapping negotiator for the FBI, Chris Voss has plenty of experience with high-stakes negotiations. He shares his tips for the negotiations we face each and every day.

    Click HERE for the full episode with Chris Voss.

    [64:09] - Steve Gibson has been working on computers since before the internet existed. He shares how the internet was not designed with security in mind and what kind of online security we can hope for in the future.

    Click HERE for the full episode with Steve Gibson.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest
  • Many people are comfortable sharing data in an environment that they believe to be a safe space. But not everyone considers where that health data goes after it has been collected. Today’s guest is Katie Lips. Katie is an author and entrepreneur who helps consumers to understand the value of their data and protect themselves online. She is currently creating a data-centric health app with her extensive experience.

    Show Notes: [0:51] - Katie shares her broad and diverse career in technology. [2:06] - The growth of the internet has changed exponentially since its inception. [4:04] - Covid opened up everyone’s eyes on how useful data is in the health space. [5:16] - For many, sharing health data during the pandemic made them nervous. [6:19] - Many of us have health tracking apps and devices that collect an enormous amount of data. [7:57] - Sharing data means that it could land in the hands of companies that you may not want to have so much information on you. [8:43] - Consider who will see your data as it can paint a picture of who you are and your life. [10:00] - Fitness trackers use a GPS which is a great tool for runners, but Chris shares an example of how it puts military personnel at risk. [12:29] - If you share health data online, like on social media, it is considered personal data and isn’t strictly governed. [14:05] - Some companies may use social media to determine how healthy someone is. [15:36] - The truth is, we don’t know who can take that data and use what they want. [17:01] - Chris and Katie discuss an example of unintended consequences of using health tracker apps. [19:50] - What is a data play? [21:23] - Some data is best preserved as saved on a device rather than online. [22:52] - It’s important to consider what data would be accessed in a breach as a consumer and a business owner. [24:14] - The possibility of data being sold to health insurance companies is a scary concept. [25:47] - There is a difference between sick care and health care and this space has changed in recent years. [27:37] - Can your health choices be held against you with your health provider? [29:44] - Chris describes an insurance company incentivizing healthier choices. [31:56] - Companies need to be more upfront on what the data shared will be used for. Chris and Katie believe that is something that will become more common. [34:30] - Katie describes her startup and health journey. [37:07] - Something can be data driven, but doesn’t collect a lot of unnecessary data.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Eatiful Website Katie Lips Website Katie Lips on Instagram Katie Lips on LinkedIn
  • Virtual networks with anonymous accounts allow cybercrime gangs the ability to work together without even knowing who they work with. This could be how the good guys infiltrate these networks.

    Today’s guest is Peter Taylor. Peter is a former police detective and Director of Fraud Management for major UK companies. Ten years ago he set up his own consultancy and has established a reputation as “The Fraud Guy” specializing in research, training, and investigation around organized crime.

    Show Notes: [0:50] - Peter shares his background and why he’s known as The Fraud Guy. [2:10] - Throughout his career, Peter spoke with former cybercriminals and hackers. [3:51] - Cybercriminals are applying advanced business techniques to their organizations. [5:40] - What gets ignored is what cybercriminals and former criminals can tell us. [6:46] - We know that cybercriminals can watch what we’re doing, but what we don’t think about is that we can do the same to them. [8:49] - The first function of these organized cybercrime gangs is to steal data. Next is to buy and enhance the data. And the third is to cash out. [10:50] - There are some exceptions to the rule. [11:50] - The purpose of creating false identities has changed over the years. [13:53] - The biggest advantage that cybercriminals have is they get things done, while the good guys abide by time-consuming policies. [15:14] - Peter feels like the “good guys” need advice on how to help this problematic trend. [16:28] - The more sophisticated areas of cybercrime, the more elitist are actually a small portion. The largest portion of cybercrime is actually several years old. [20:11] - Peter shares an example of how organized cybercrime has impacted corporations as well and the rise of check fraud. [23:07] - The common Nigerian prince scam still works! [25:13] - Guilt and fear are commonly triggered emotions. [27:03] - Another reason the Nigerian prince scam works is the trigger of a victim’s ego. [28:36] - The use of bots and automated messaging can hit so many people at one time with very little effort. [29:50] - Talk to the people who are important to you that may not be aware of these scams. Just because we know it, doesn’t mean they do. [30:56] - Millennials are now the highest target age bracket of those being targeted by scams. [32:40] - Cybercriminals reach a point of success where it’s no longer about the money. It’s about their ego. [36:00] - We have to understand the difference in lifestyle and how cybercriminals recruit more people. [37:43] - There is little to no support for scam victims and in many countries there are no laws stating that this is even illegal. [40:18] - What role does machine learning play? [43:01] - Peter shares some experiences in changing up his spending habits. [45:12] - There are many different types of ways to access data that Peter lists here. [46:52] - There is a lot more going on before, during, and after every single transaction, especially those done online. [48:59] - Peter initially got into fraud because of an increase in the apparent theft of thousands of vehicles. [50:20] - Insurance fraud is also a very common problem. [52:53] - Obligatory security is a form of protection that could be a solution to many problems. [54:08] - Peter is optimistic about the future of cybersecurity. [55:35] - If we can decrease the money taken by cybercriminals through fraud, the money can be used for better things. [57:56] - There are some varying opinions on the politics of scams. [59:49] - Many scammers are in the industry out of desperation. [61:35] - We can’t continue to be in a world where this industry grows.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Peter Taylor The Fraud Guy on LinkedIn
  • We understand that hackers look for weaknesses in networks to manipulate or take data, but understanding the ways that vehicles can also be accessed either remotely or physically can be a bit surprising.

    Today’s guest is Derrick Thiecke. Derrick works as an Embedded Systems Security Tester in the automotive industry where he found himself after spending over a decade in the corporate IT world. When Derrick isn’t data dumping ROM chips, scouring through vehicle log data, or fuzzing CAN networks, he can be found as a brief blur passing by you on the highway.

    Show Notes: [0:58] - Derrick shares his background and current role as a security tester for automotive controllers and devices. [3:30] - There are differences between vehicle networks and home networks. The main network for vehicles is CAN bus. [5:12] - Because it is a bussed network, Derrick explains how all devices on the network can access all the data. [6:50] - Previously, you had to have physical access to hack a car, but not anymore. [8:19] - Derrick describes how his own vehicle accesses data on a network. [9:56] - The implementation of standards has changed the way vehicles are serviced. [11:18] - Safety critical features are isolated, but some things can still be accessed that can be harmful. [12:29] - There was an event in 2015 where a parking feature was hacked while the vehicle was in motion. [13:59] - There are ways to communicate with and change the fuel mapping over CAN bus, but there is usually a physical component required. [16:07] - Derrick describes a scenario that creates a potential threat. [19:04] - The automotive industry typically sits about a decade behind in technology. [21:24] - Derrick lists some of the features in a vehicle that are connected to a network. [23:18] - The number of vehicle recalls due to software issues has increased since 2015, but the issues aren’t growing. [25:01] - Movies depict vehicle hacking as possible disasters. Derrick shares his concerns. [26:44] - When ransomware became a problem, we had the same questions. The threat for the worst case scenario is plausible. [28:31] - Derrick describes the most concerning problem he has experienced as a tester. [30:59] - Different cars all use the same controllers, even those without the same features. [32:26] - There are devices that can unlock vehicles without the key or keyfob. [34:18] - When there is an issue with a computer, typically there is an update to solve it. That currently isn’t the case for most vehicles. [35:41] - There are some updates that can happen remotely, but the catch-22 is that the wireless connection makes the vehicle susceptible to threats. [37:02] - There is a huge shortage of workforce in this industry. [38:41] - Derrick recommends the book The Car Hacker’s Handbook if you are interested in this field.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Derrick Thiecke on Twitter Email Derrick Thiecke The Car Hacker’s Handbook by Craig Smith
  • Scammers are brilliant at targeting the vulnerable and then often using the fear of exposure to extort even more out of them. Education about these manipulators isn’t enough. Can we do more to make a global impact knowing that less than 0.1% of scammers are ever prosecuted?

    Today’s guest is Jorij Abraham. Jorij Abraham is the Managing Director of the Global Anti-Scam Alliance with a mission of preventing consumers worldwide from getting scammed. He is also the General Manager at ScamAdvisor.com, the global blacklist for malicious websites. In addition, Jorij is an ecommerce professor at University of Applied Sciences TIO.

    Show Notes: [1:01] - Jorij shares his current roles and background in the field. [2:27] - He fell into ScamAdvisor when working in ecommerce. [3:42] - Scammers are remarkably smart when it comes to marketing fake sites. [5:12] - Subscription scams are specifically successful in getting quite a lot of money from victims. [6:18] - Scammers tend to take advantage of current events such as the energy crisis and abortion and then extort their fear of exposure. [7:26] - ScamAdvisor.com sees over 4 million visitors per month and they are from all over the world. [8:24] - In most countries, victims of scams are unable to get any help. [9:49] - Jorij explains how the laws work regarding scammers and the pitfalls of the process. [11:40] - It’s important to educate consumers, but there’s only so much that can be learned. [12:56] - The tips and tricks that helped just a few months ago are already not working all the time. [14:33] - Jorij describes a Ponzi scheme that took down the government in Albania. [16:10] - One little bump in supply and demand has drastic ripple effects. [17:32] - Scams are not simple anymore. The marketing power is extremely impactful and mostly successful. [19:11] - Even in the Netherlands, FBI phone scams are successful. [21:00] - Jorij predicts that legislation will be necessary. [22:10] - Awareness is good, but consumers need more protection. [23:35] - Phishing scams are created to filter out specific groups of people. [24:37] - Jorij shares his thoughts on retraining scammers to do good, especially since they are skilled hackers. [26:34] - How can we reduce scams? [27:41] - The Global Anti-Scam Alliance is a networking organization with the goal of pushing everyone together to define new ways to combat scams. [29:17] - Jorij describes the changes coming to ScamAdvisor.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jorij Abraham on LinkedIn ScamAdvisor.com Global Anti-Scam Alliance
  • Utilizing hacking skills cannot only make it easier to work with management, but helps translate technical information for non-technical staff. Today’s guest is Alyssa Miller. Alyssa is a lifelong hacker and cybersecurity leader. She is the CISO for Epiq Global and has over 16 years experience in security. She is an internationally recognized speaker, author, and researcher. She has also been featured in Tribe of Hackers blue team, Cybercrime magazine, and many other media.

    Show Notes: [1:06] - Alyssa has always been a hacker and shares the beginning of her journey. [3:01] - She saved up her money in the late 80s to buy her first computer. [5:04] - When she received discs for internet and couldn’t pay for it as a 12 year old, she learned how to hack into the internet provider. [7:11] - Alyssa got her first full time job in tech at 19 years old and then began her career in cybersecurity. [9:24] - After working as a consultant for a while, she worked for a Wall Street Firm. [11:09] - Alyssa explains how she serendipitously fell into her current role as a CISO. [13:41] - In management, Alyssa believes that the ability to translate technical terms to non-technical staff is a requirement for management positions. [16:12] - Hackers want to know how things work and how to make them work differently. [17:47] - CISO is a role that hasn’t existed for a long time. [19:13] - Because it is a relatively new role, how is knowledge built for people coming into that role? [21:10] - Technology and security have always been connected. [23:16] - Risk management is an important part of what Alyssa does. [25:56] - Alyssa demonstrates how she communicates risk to business leaders. [27:59] - In her current CISO position, she is pulled away from the tech part of things. She likes looking at the bigger picture. [29:58] - Misinformation is the main concern for the future in security. [32:18] - Privacy concerns will spill into the cybersecurity realm as well. [33:37] - The line between physical and digital gets increasingly blurred. [34:53] - Kids growing up in this digital world need to learn how to be safe online. [37:01] - How will the next generation operate in regards to cybersecurity? [39:50] - Colleges need to be focusing on concepts, rather than actual programs. [41:52] - There are amazing graduate programs, but there are professionals who are incredible as self-taught. [43:42] - This is a hot industry but not everyone is cut out for the skills needed to be right for the job. [45:20] - In Alyssa’s book, there are activities that help those seeking employment in cybersecurity. [46:56] - Her book is available online and in retailers.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cybersecurity Career Guide by Alyssa Miller Alyssa Miller on Twitter Alyssa Miller Website
  • Online dating has become more complicated than ever. Learning how to verify that the person you’re talking to is actually the person in the dating profile can save you from heartbreak and financial loss.

    Today’s guests are Kathy Waters and Bryan Denny. Kathy Waters is an expert advocate and an educator on the subject of online romance scams. Kathy is co-founder, along with retired Colonel Bryan Denny, of the non-profit organization Advocating Against Romance Scammers. Both have been working for safer platforms since 2016 with the same goals in mind: justice for victims and educating all online of the cybercrime known to tear people down emotionally, psychologically, and financially.

    Show Notes: [1:18] - Bryan shares his experience with someone using his name and images in fake profiles. [3:00] - Kathy’s mother’s friend was a victim of a romance scam that used Bryan’s photos. [4:36] - AARS became a non-profit last year and works to educate not only users, but lawmakers, too. [6:01] - Dating profiles of someone in military uniform is a red flag. [7:41] - There are many red flags to look for and there will often be more than one indicator. [8:50] - Ask a friend in the military about an unusual profile or reach out to Kathy and Bryan. [10:23] - It’s tough to get people to report these interactions. [11:40] - Prior to Covid, the demographic was more elderly aged people. But a younger crowd has been affected since Covid. [13:22] - Younger people are more likely to come forward and talk about their experiences than an older demographic. [14:41] - It is also therapeutic to come forward and talk about it. [16:07] - Scammers tend to have a similar story, working out of the country. [17:51] - Bryan shares that he continues to receive messages about his photo circulating on fake profiles and the stories are all very similar. [20:07] - Bryan explains how scammers manipulate videos to pretend to be interacting on video calls. [22:23] - If you’re concerned about interacting with someone through video calls, you can ask them to do something like touch their head or look a certain way. [24:01] - What do you do if you know you are interacting with a scammer? [26:04] - Scammers share where they have had success with other scammers. [27:43] - If you are watching this happen to someone else, there are ways to approach it with them. Outsiders tend to see the red flags sooner. [28:54] - Unfortunately, they may not believe you. Try to educate them on red flags. [29:46] - There are support groups for helping manage the emotional toll this takes on a victim. [32:09] - What laws are in place for this? [33:19] - Scammers are typically in another country. They are hard to go after legally because they are not in the United States. [34:49] - On their website, there are commonly used photos in fake profiles and ways to report a scam.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Advocating Against Romance Scammers (AARS) Website
  • Every time you pay a bill, data is sent to a credit reporting agency. Errors can be made. It’s important to know where to look to see if your credit information is correct, stolen, or purchased. Today’s guest is Steve Baker. Steve is chairman of the Privacy Rights Institute. He is a lawyer and previously served as a leader at the FTC for over 27 years addressing consumer fraud in areas like telemarketing and spamming. Steve now writes The Baker Fraud Report, a free weekly newsletter covering consumer fraud from around the world.

    Show Notes: [1:08] - Steve shares what he currently does with The Baker Fraud Report and his career background. [2:46] - In the field of consumer fraud, there is always something to learn. [3:27] - The Privacy Rights Institute is meant to educate people on their rights regarding credit reporting. [5:02] - With tons of pieces of data, errors can occur. [6:05] - Steve shares some of the people who can pull your credit report. [7:34] - One error happens when people with the same name get mixed up. [9:04] - Steve explains how the system is supposed to work. [11:07] - Unfortunately the credit reporting agencies have poor customer service. [12:54] - Credit reports can also be pulled by employees and associates at places like car dealerships. There’s no stopping them from searching anyone. [13:40] - Data breaches are also a concern and can lead to identity theft. [15:27] - The Los Angeles school district recently experienced a data breach through ransomware. [17:25] - There are some alternatives that are starting to come out for security. [18:56] - With the increase in people changing jobs and the economy in its current state, credit reports are being pulled more frequently at the moment. [21:09] - You can get a copy of your credit report once a year. Do this at AnnualCreditReport.com. [22:26] - If you see an error, reporting it to one agency is good. Keep an eye on your credit card bills. [24:24] - Scammers have also been known to alter recordings of your voice on the phone. [26:04] - If you see an unusual charge, don’t try to locate or contact the person who made the charge. [27:48] - Currently, the best way for scammers to get your money is through cryptocurrency. [29:07] - Immigrants are particularly hit hard by scammers and credit report confusion. [31:01] - Keep an eye on your credit reports and periodically check for errors. [32:06] - Steve explains how credit repair works and what to look for.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest AnnualCreditReport.com Baker Fraud Report
  • Consumer Reports is known for the research and comparisons of products and services, but they also offer a free personalized security and privacy planner. Today’s guest is Amira Dhalla. Amira is the Director of Impact Partnerships and Programs at Consumer Reports focusing on digital privacy and security. Amira works on projects that improve the cybersecurity and privacy products and tools on the marketplace while also tackling topics like discriminatory technologies, deceptive design, trust, and safety.

    Show Notes: [0:57] - Amira shares her background and her role at Consumer Reports. [3:10] - The internet is incredible, but the quality isn’t always what it should be. [4:26] - Technology has expanded at an unprecedented rate. [6:14] - Amira explains some of the fears that people had in different countries when learning about internet use. [7:21] - Security Planner has been around for a long time and Consumer Reports brought it into their toolset a few years ago. [9:29] - Constant updates as technology changes and trends emerge is crucial. [11:19] - Consumer Reports studies tools people use. MFA is becoming much more commonly used. [12:30] - MFA is also required by many organizations for their employees. [13:40] - Password managers are not trending as more commonly used. [14:14] - Amira shares Consumer Report’s picks for password managers and VPNs. [16:12] - Online shopping has increased since the pandemic and is prime time for scammers. [17:31] - There are ways to be smarter online shoppers. [19:45] - What is a Grinchbot? [20:59] - Once you go to a third party site, you are no longer secure. [23:07] - Amira describes some of the things to look for to determine if you are looking at a fake site. [25:20] - Question yourself on why a site needs the information they are asking for. [27:54] - Charity scams are a huge problem particularly during the holiday season. [29:10] - Always go to the site you know directly.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Security Planner
  • Criminals and trained to hone in on people who are vulnerable. Listen on to learn how you can protect the people you care about and what signs to look out for. Today’s guest is Louise Baxter. Lou graduated with a law degree and worked for Sussex Trading Standards. She took over as the chair of the Chartered Trading Standards Institute's consumer power alliance and is the CTSI’s lead officer of education. She got frustrated by the system in relation to support of scam victims and started what is now the National Trading Standard Scams Teams, and she was awarded an MBE for protecting vulnerable consumers from financial abuse.

    Show Notes: [1:10] - Lou shares her background and why she was driven to be more proactive. [3:05] - Her team deals with specific types of scams. [5:19] - If you respond to one letter scam, your details get passed around to more. [6:54] - There are times of mental health challenges that make you vulnerable, such as grief and high stress. [8:40] - There are different types of vulnerabilities and you could experience several at once. [10:51] - There are mental health impacts when learning that you’ve been a victim of a scam. [12:35] - Scams are only reported between 5 and 15% of the time. [14:48] - Even Louise has been affected by situational vulnerability. [16:01] - Louise describes the way a lottery scam increases their web of victims. [18:49] - What support is available for scam victims? [20:35] - Louise shares the types of responses her team receives when they reach out to scam victims. [23:00] - Situational vulnerability creates opportunity for scammers to make their message more believable. [25:35] - At the start of Covid-19, vulnerabilities were at an all time high. [27:13] - Criminals can target constantly. [28:38] - One million people have completed the training Louise’s company offers. [30:19] - As a society, we need to begin supporting victims rather than shaming them. [32:50] - Scams and fraud are forms of emotional abuse. [34:12] - Lou compares the tactics used by scammers to domestic emotional abuse. [35:41] - Louise explains that most criminals are not in the same country as their targets. [37:35] - There has been some valuable international work that’s been done, but every country operates a bit differently in their standards.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest