Mobile Device Threats Podcast Por  arte de portada

Mobile Device Threats

Mobile Device Threats

Escúchala gratis

Ver detalles del espectáculo

OFERTA POR TIEMPO LIMITADO | Obtén 3 meses por US$0.99 al mes

$14.95/mes despues- se aplican términos.
In a world where we're told to carry our entire lives in our pockets, we've reached a strange tipping point where the very devices meant to connect us have become windows into our private lives for those who wish us harm. It's no longer a matter of looking for the "shady" corners of the internet; today, the threats come from nation-state actors, advanced AI, and even the people we think we're hiring. We are living in an era where the most sophisticated hackers aren't just trying to break into your phone, they're trying to move into your business by pretending to be your best employee. Joining the conversation today is Jared Shepard, an innovative industry leader and the CEO of Hypori. A U.S. Army veteran with over 20 years of experience, Jared's journey is far from typical; he went from being a high school dropout to serving as a sniper and eventually becoming the lead technical planner for the Army's Third Corps. He is also the founder of Intelligent Waves and the chair of the nonprofit Warriors Ethos, bringing a perspective shaped by years of advising technologists in active war zones. We're going to dive deep into why Jared believes everything you own should be considered already compromised and why that realization is the first step toward true security. From the terrifying reality of his own 401k being stolen via identity theft to the future of "dumb terminals" that protect your privacy by storing nothing at all, this discussion challenges the status quo. We'll explore how to navigate a future where AI can fake your identity in real-time and why the ultimate battle in cybersecurity isn't against a specific country, but against our own human tendency toward laziness. Show Notes: [[02:12] Jared Shepard of Hypori is here to discuss how modern cyber threats actually play out in real life.[04:48] How modern attacks unfold slowly instead of triggering obvious alarms.[05:55] Why many victims don't realize anything is wrong until secondary systems start failing.[07:56] What identity theft looks like when accounts are targeted methodically over time.[08:48] How attackers prioritize persistence and access over immediate financial gain.[10:32] A real attempt to take over long-term financial accounts and how it surfaced.[13:07] Why financial institutions often respond late even when fraud is already underway.[15:44] The limits of traditional identity verification in an AI-driven threat environment.[16:52] Why layered authentication still fails when underlying identity data is compromised.[18:21] Deepfakes, voice cloning, and why video calls no longer prove much.[20:57] How laptop farms are used to bypass hiring controls and internal access checks.[22:18] Why insider-style access is increasingly coming from outside the organization.[23:33] Why some companies are quietly bringing back in-person steps for sensitive roles.[26:09] SIM farms, mobile identity abuse, and how scale changes detection.[28:47] The growing tension between personal privacy and corporate device control.[31:22] Why assuming device compromise changes everything downstream.[33:58] Isolating data from endpoints instead of trying to secure the device itself.[35:12] How moving compute and data off the endpoint reduces exposure without requiring device monitoring.[36:35] How pixel-only access limits data exposure even on compromised hardware.[39:11] Why AI training data introduces new security and poisoning risks.[41:46] Why recovery planning is often overlooked until it's too late.[44:18] The problem with victim-blaming and how it distorts security responses.[46:52] Why layered defenses matter more than any single tool or platform.[47:58] What practical preparation looks like for individuals, not just enterprises.[49:12] Rethinking privacy as controlled access rather than total lock-down. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestJared Shepard - HyporiJared Shepard - LinkedInWarriors Ethos - Jared Shepard
Todavía no hay opiniones