Easy Prey Podcast Por Chris Parker arte de portada

Easy Prey

Easy Prey

De: Chris Parker
Escúchala gratis

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim. Biografías y Memorias Crímenes Reales Política y Gobierno
Episodios
  • The Global Scam Battle
    Sep 24 2025
    Cybercrime continues to evolve in sophistication and scale, with attackers running their operations much like businesses. From ransomware gangs with customer support desks to AI-generated phishing campaigns that erase traditional red flags, scams are becoming harder to detect and stop. In this episode, David Bittner, host of the CyberWire Daily Podcast, shares his perspective on the changing landscape of fraud and cyberattacks. Drawing on his background in media, theater, and podcasting, as well as years of reporting on security issues, he explains how both criminals and defenders are using AI, why ransomware has exploded instead of fading, and how scams exploit human trust and expectations.. David also talks about common scams hitting people today, from toll violation texts and fake bank calls to romance scams on social media. He recounts personal experiences of being targeted, including a Facebook credential-harvesting attempt and an exit-ramp “out of gas” con, to show that no one is immune. Looking ahead, he predicts existing scams will keep evolving, AI will continue to raise the stakes, and defenders may eventually need AI “agents” watching out for them in real time. Show Notes: [02:00] David explains how CyberWire grew from a daily news brief into a full podcast network covering cybersecurity.[04:21] David recalls his background in media, theater, and early computer culture that shaped his path.[05:52] We hear how luck, timing, and technical skills combined to make podcasting a success for him.[07:17] David shares why he believes AI is the biggest change to cybersecurity in the past decade.[08:00] He notes that bad grammar is no longer a reliable phishing red flag thanks to large language models.[10:11] We discuss how phishing awareness training must adapt to more convincing scams.[12:30] He reflects on the unexpected rise of ransomware compared to early predictions about cryptomining.[14:08] David explains how ransomware groups now operate like corporations with support teams.[16:00] He raises concerns about ransom payments funding overseas criminal networks in Russia and North Korea.[18:15] We learn how scammers use call centers and human trafficking to scale their operations.[19:30] David describes current scam trends, including fake toll violation texts and AWS account alerts.[21:32] He points out how romance scams thrive on social media platforms like Facebook.[22:16] David recounts a frightening call where his mother was nearly scammed by criminals posing as bank security.[25:09] He emphasizes how scammers manipulate victims to stay locked into the story and ignore warnings.[26:03] We hear how criminals pressure victims into withdrawing cash, buying gold, or handing funds to unwitting couriers.[27:00] David shares a case where a delivery driver was tragically killed after being caught up in a scam pickup.[29:00] He talks about his own experiences of being scammed, including a Facebook credential-harvesting attempt.[32:08] David recalls falling for an “out of gas” roadside con and explains why he still prefers trusting people.[34:00] He reflects on how vague scam messages exploit imagination and insecurities.[36:08] We hear examples of scams that exploit real-life contexts, such as HR benefits or package deliveries.[37:45] David explains his current vigilance with real estate transactions and wire transfer fraud.[39:26] He predicts the next wave of scams will be evolutions of what already works, boosted by AI.[40:07] David outlines the persistence of “treasure box” and inheritance scams dating back hundreds of years.[41:02] He shares his hope that future AI “agents” will act as a safeguard for vulnerable users.[42:21] David speculates about “nuisance ransomware” that charges small amounts to fly under the radar.[43:25] He jokes about calling it “inconvenienceware” and wonders if such a niche could emerge.[44:39] David directs listeners to CyberWire.com to explore his podcasts and resources. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestCyberWire DailyHacking HumansCaveatCyberWire
    Más Menos
    45 m
  • AI Supercharges Scams
    Sep 17 2025
    Cybercriminals are accelerating their attacks in ways that weren’t possible a few years ago. Artificial intelligence is giving them the ability to spin up phishing campaigns, voice clones, and deepfakes in minutes instead of days. As a result, the gap between what’s genuine and what’s fake is closing fast, making it harder for both individuals and organizations to defend themselves. I’m thrilled to welcome Brett Winterford, Vice President of Okta Threat Intelligence. Brett has had a front row seat to these changes. His team analyzes identity-based attacks and delivers insights to help organizations adapt their defenses. Brett previously served as Okta’s Regional CISO for Asia-Pacific and Japan and started his career as a journalist covering information security before moving into leadership roles in banking, government, and technology. In this episode, Brett explains how AI is reshaping the speed and scale of cybercrime, why trusted platforms like email, SMS, and collaboration tools are being targeted, and what practical steps can reduce risk. He highlights the growing importance of phishing-resistant authentication methods like passkeys, the need for clearer communication between service providers and users, and the role of collaboration across industries and law enforcement in pushing back against attackers. Show Notes: [00:00] Brett Winterford introduces himself as Vice President of Okta Threat Intelligence and explains how identity-based threats are monitored.[02:00] He shares his career path from cybersecurity journalist to CISO roles and now to leading threat intelligence.[05:48] Brett compares phishing campaigns of a decade ago with today’s AI-driven ability to launch attacks in minutes.[08:00] He notes how reconnaissance and lure creation have become easier with artificial intelligence.[10:40] Brett describes the shift from banking malware to generic infostealers that sell stolen credentials.[12:30] He explains how cryptocurrency changed the targeting of attacks by offering higher payouts.[14:21] We learn about the Poison Seed campaign that used compromised bulk email accounts to spread phishing.[15:26] Brett highlights the rise of SMS and other trusted communication channels as phishing delivery methods.[16:04] He explains how attackers exploit platforms like Microsoft Teams and Slack to bypass traditional defenses.[18:30] Brett details a Slack-based campaign where attackers impersonated a CEO and smuggled phishing links.[22:41] He warns that generative AI has erased many of the old “red flags” that once signaled a scam.[23:01] Brett advises consumers to focus on top-level domains, official apps, and intent of requests to detect phishing.[26:06] He stresses why organizations should adopt passkeys, even though adoption can be challenging.[27:22] Brett points out that passkeys offer faster, more secure logins compared to traditional passwords.[28:31] He explains how attackers increasingly rely on SMS, WhatsApp, and social platforms instead of email.[31:00] Brett discusses voice cloning scams targeting both individuals and corporate staff.[32:30] He warns about deepfake video being used in fraud schemes, including North Korean IT worker scams.[34:59] Brett explains why traditional media-specific red flags are less useful and critical thinking is essential.[37:15] He emphasizes the need for service providers to create trusted communication channels for verification.[39:29] Brett talks about the difficulty of convincing users to reset credentials during real incidents.[41:00] He reflects on how attackers adapt quickly and why organizations must raise the cost of attacks.[44:18] Brett highlights the importance of cross-industry collaboration with groups like Interpol and Europol.[45:24] He directs listeners to Okta’s newsroom for resources on threat intelligence and recent campaigns.[47:00] Brett advises consumers to experiment with passkeys and use official apps to reduce risk.[48:00] He closes by stressing the importance of having a trusted, in-app channel for security communications. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestBrett Winterford - LinkedInBrett Winterford - Okta
    Más Menos
    49 m
  • Vanishing is a Lie
    Sep 10 2025

    Trying to erase yourself from the internet sounds simple until you start counting up old accounts, scattered social media posts, and the hundreds of data brokers quietly collecting and selling your information. The reality is messy, and for most people, the idea of fully disappearing online is more myth than possibility. But there are practical steps you can take to cut down what’s out there and regain some control.

    My guest, Max Eddy, is a senior staff writer at Wirecutter who covers privacy, security, and software platforms. For one of his projects, he set out to see how much of his own digital footprint he could realistically reduce. Max shares what he discovered along the way and what worked, what didn’t, and how even small changes can make a meaningful difference.

    In our conversation, Max talks about the value of using password managers and email masking, what he learned from testing multiple data removal services, and the emotional side of deleting old social media history. He also explains why perfection isn’t the goal, and how thinking differently about privacy can help you stay one step ahead of scammers, marketers, and anyone else trying to piece together your personal information.

    Show Notes:
    • [00:50] Max explains why he got into covering privacy and security and what keeps him motivated in the field.
    • [03:27] We discuss the Wirecutter project on disappearing online and why it resonated with readers.
    • [04:12] Using Have I Been Pwned, Max was able to reduce 350 online accounts down to 27 that needed immediate attention.
    • [09:10] Max describes the tactics he used to break the links between his online accounts with fake names, masked emails, and random images.
    • [11:55] We talk about data removal services, their limitations, and the challenges of removing certain public records.
    • [17:52] We learn how scammers can piece together a person's complete profile from inconsistent, fragmented data from different data brokers.
    • [18:54] We discuss how Google's removal tools only make information harder to find, but don't delete it.
    • [23:15] We talk about the emotional side of deleting social media history and the automation tools he used to make it possible.
    • [29:40] Max discusses the risks of deleting accounts entirely, from impersonation threats to losing important communication channels.
    • [32:28] We talk about the value of taking a gradual approach to improving your digital privacy and how small, steady steps are most effective.
    • [38:44] Max shares his key takeaways from the project: first, ask why you want to disappear, and second, remember that any effort to reduce data is valuable.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Max Eddy - Wirecutter
    • I Tried, and Failed, to Disappear From the Internet
    • Max Eddy
    • Have I Been Pwned
    Más Menos
    41 m
Todavía no hay opiniones