All Episodes
Easy Prey — 322 episodes
Elder Exploitation
Art Heists
The Power of Prediction
Privacy vs Reality
Wired to Trust
Intimate Partner Fraud
Identity without Passwords
When Cybercrime Gets Personal
Stopping Phone Scams
Stolen Identity - Stolen Peace
Inside Modern Fraud
Money Laundering
Critical Infrastructure Risks
Familial Identity Theft
Exploiting Trust (Part 2)
Exploiting Trust (Part 1)
Surviving a Ransomware Attack
Why You Fall For Scams
Mobile Device Threats
Past, Present, and Future of AI agents
You Are Traceable with OSINT
Anyone Could Walk In
The Scam You Never See Coming
Hacking AI
The Ransomware War
Opportunistic Crimes
Post Scam Guidebook
Can You Trust Anything Online
Real Time Fraud Detection
Child Predator Tactics
Identity Trafficking
Technology, Trust & Time
The Global Scam Battle
AI Supercharges Scams
Vanishing is a Lie
Hackers Are Winning
Before the Fraud Tsunami Hits with Ritesh Kotak
Privacy is Dead
America's Scam Crisis
How Fraudsters Choose Targets
Hidden Dangers of AI in Cybersecurity
Author Scams Exposed
Tricked by Followers and Badges
Only 10 Seconds to Expose a Scam
Gambling, Lies, and Millions Stolen from Celebrities
Human Side of Fraud: Empathy, Education, & Evolution
Identity Is The New Security Perimeter
Your Car Is Spying On You What It's Collecting and Who It's Telling
Why Everyone's A Target
Child Exploitation Cyber Investigations
Reclaiming the Internet
Security Gaps Hackers Exploit
Cyber Warfare
DDoS Attacks
Safe AI Implementation
The Art of Espionage
Understanding Ransomware and Defense Strategies
Privacy and Surveillance
Navigating Data Brokering and Privacy
Be Your Own Fraud Prevention Hero
Empowering the Vulnerable
How Not to Money with Joel Larsgaard
Brushing Scams with Venkat Margapuri
Ransomware, Phishing and Fraud
CISOs: The Ultimate Stress Test With Jill Knesek
AI, Automation, and the Future of Cybersecurity With Mike Lyborg
Cybersecurity Training from Boring to Engaging With Howard Goodman
Next-Gen Account Security with Christiaan Brand
5 Key Cybersecurity Elements with Kelly Hood
Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
Why Resolutions Fail with Dr. Leslie Becker-Phelps
Erasing Your Digital Footprint with Jeff Jockisch
Executive Recruiter Scams with John Sidoti
Human Hacking with Peter Warmka
Digital Deception: What Lies Ahead with Perry Carpenter
Rethinking Online Anonymity with Lance Cottrell
AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca
Understanding and Avoiding Triangulation Fraud with Soups Ranjan
Finding Small Business Fraud with James Ratley
Truth and Lies with Mark Bowden
The Update That Broke America with Gabe Dimeglio
A Lesson in Crisis Management with Jeremiah Grossman
Pig Butchering Is Getting Worse with Erin West
Protecting Parents with Terri Proctor
Technology Regulation is Outdated with Bruce Schneier
Threat Emulation with Andrew Costis
Ransomware: To Pay or Not To Pay? with Amitabh Sinha
Firewalls Don't Stop Dragons with Carey Parker
Stopping Robocalls with Aaron Foss
Safety Can't Be an Afterthought with Kris Burkhardt
Child Safety Tips with Steve Lazarus
Fraud: Not Going Away with Steve Lenderman
Phishing Attack Awareness and Training with Josh Bartolomie
Consumer Education for Fraud Protection with Doug Shadel
Educating Teens About Technology is Necessary with Clayton Cranford
Protecting Financial Accounts From Scams and Fraud with John Buzzard
AI: Doomsday vs. A Very Bad Day with Dr. Robert Blumofe
Preventing SIM Swapping Scams with Mark Kreitzman
The Problem with Not Reporting Scams with Kathy Stokes
The Difference Between Fraud and Scams with Uri Rivner
Sex Trafficking and Murder on the Road with Frank Figliuzzi
Next Gen Romance Scams with Anna Rowe
Challenges of Employee Onboarding and Offboarding with Craig Davies
5 Common Uses of Synthetic IDs with Stuart Wells
Vantage Travel Bankruptcy with Michelle Couch Friedman
Cybersecurity for Everyday People with Greg Tomchick
Misunderstanding Victims of Romance Fraud
Scams Exploiting Emotions with Alan Castel
3 Types of Insider Fraud with Claire Maillet
5 Fraud Vulnerability Factors with Martina Dove
Hacker Tactics with John Hammond
Top 5 Supply Chain Risks with Kevin Kumpf
The Risks and Rewards of Cryptocurrencies with Natalie Brunell
Tax Scams with Richard Gilbert
Virtual Kidnapping with Titania Jordan
Balancing Privacy, Security, and Accountability with Kurt Long
5 Alerts to Prevent Identity Theft with Paige Hanson
Advances in Everyday Tech with Leo Laporte
Financial Exploitation of Older Adults with Joyce Petrowski
Advances in Crypto with Bam Azizi
How Minds Change with David McRaney
The Intersection of Technology and Domestic Violence with Audace Garnett
4 Ways to Reduce Cybercrime with Roger Grimes
Fake vs. Taken-Over Accounts with Jason Kent and Will Glazier
The Changing World of Data Breaches with Troy Hunt
When Conservatorships Go Wrong with Diane Dimond
5 Things to Teach Your Kids About Predators with Michael Buraimoh
The Evolution of Digital Identity with Philipp Pointner
Preventing and Reporting Cyber Attacks with Robert Karas
Support to Navigate the Justice System with Rachel Gibson
Human Trafficking Into Scam Call Centers with Matt Friedman
Active Shooter Preparedness with Katherine Schweit
The Passwords Are the Problem with Thierry Gagnon and Philippe Desmarais
5 Ways to Stay Safe Online with Patrick McNamara
Tracking Down Scammers with Ryan Kelly
World Romance Scam Prevention Day - October 3rd with Kathy Waters and Bryan Denny
Stopping Financial Fraud with Giles Mason
Buyer Beware with Marta Tellado
Scambaiting with Pierogi
Being Foolproof to Misinformation with Sander van der Linden
Why We Fall for Scams with Chris Chabris and Dan Simons
Securing IoT and Cyber Warfare with Mikko Hypponen
Behavioral Analysis From an FBI Expert with Robin Dreeke
7 Flags of MLM with Roberta Blevins
Reading and Understanding Behavior with Chase Hughes
Ever-Changing Cyber Crime with Raj Samani
What NOT to Do When Wiretapping the Government with Bryan Seely
The Human Side of Cyber Security with Jessica Barker
Diet Culture and Wellness Traps with Christy Harrison
New and Improved Nigerian Scams with Ronnie Tokazowski
10 Types of Identity Crimes with Eva Velasquez
The Science of Social Engineering with Chris Hadnagy
Preventing Email Attacks with Kiri Addison
The Balance Between Privacy and Protection with John Pizzuro
Intersection of AI and Cybersecurity with Paul Valente
Financial Vulnerability and Social Isolation with Marti DeLiema, PhD
Employment Scams Are On The Rise with Mike Kiser
The Impact of the Metaverse with Mark van Rijmenam
Questions to Ask When Vetting a Job or Business Offer with Jeff Lerner
Predicting Network Vulnerability with Hari Ravichandran
The Importance of Testing Your Cybersecurity Response with Steve Orrin
Crypto Fraud and Recovery Scams with Nick Smart
A Mentalist, Psychic, and Magician Walk Into a Bar… with Mark Edward
Cybercrime is Costing Us More Than Just Money with Rory Innes
The 4 P's of Scams with Anthony "AJ" Monaco
5 Ways to Manage Your Reputation with Darren Dunner
3 Steps to Take After a Data Breach with Robert Anderson Jr.
Top 10 Amazon Scams with Abigail Bishop
The Tinder Swindler with Ayleen Charlotte
Cybersecurity Leadership is Broken with Richard Brinson and Rachel Briggs
Synthetic Fraud with Mike Cook
AI Fake News and Reviews with Peter Sisson
Education and Scam Prevention - Easy Prey Podcast Highlights
Protecting Your Health Data with Katie Lips
How Cybercriminal Networks Are Organized with Peter Taylor
Vehicle Hacking with Derrick Thiecke
Global Scammer Impact with Jorij Abraham
Hacker to CISO with Alyssa Miller
How to Spot Fake Dating Profiles with Kathy Waters and Bryan Denny
The Danger of Errors on Your Credit Report with Steve Baker
Security Planning with Consumer Reports with Amira Dhalla
10 Situational Vulnerabilities with Lou Baxter
Protect Your Social Security Number with Kevin Roundy
Keeping Children Safe Online with Titania Jordan
Protecting Your Identity with Patrick Glennon
Investigating Cybercrime with Anthony van der Meer
Pig Butchering with Jane Lee
4 Levels of Human Factor Security with Roy Zur
15 Ways to Prevent Financial Exploitation with Cameron Huddleston
Behind the Scenes of a Scammer Syndicate with Jack Whittaker
Payment App Scams with Michelle Couch-Friedman
Fighting Against Fraud with John Breyault
Tips to Avoid Insurance Fraud with Tony Royall
Cyberbullying with Dr. Robin Kowalski
Smishing is the New SPAM with Giulia Porter
Is AI Going to Take Over the World? with Daniel Hulme
How to Avoid Scammy Tech with Ken from Computer Clan
Former FBI Agent Shares Cybercrime Trends with Eric O'Neill
The Impact of AI on Scamming with Ran Levi
Attack Techniques Scammers Are Using with Joel Hollenbeck
Security Challenges and Risks with Robert Siciliano
The Constantly Evolving Subject of Cyber Security with Stephen Cobb
Corporate Spying with Robert Kerbeck
Risk Review Helps Discover Weakness with Ralph Russo
Forensic Accounting with Leah Wietholter
The Top 5 Scams of Last Year with Melissa Trumpower
Minimizing Damage From Cyberattacks with Stuart Madnick
Hackers Don't Wear Hoodies with Lisa Plaggemier
The Impact of Cyberbullying with Tina Meier
Can You Protect Intellectual Property? with David Cooper
7 Ways to Reduce Anxiety with Dr. Michele Borba
Don't Miss Opportunities Created by AI with Howard Getson
When Violence is the Answer with Tim Larkin
Hostage Taking with Rachel Briggs OBE
Online Security: Just Hope for the Best with Steve Gibson
Get Rich Quick Schemes Vs. Investments with Justin Donald
Negotiating with Chris Voss
Identity Theft of Children with Kelli Grant
Utility Scams with Amy Livingston
Pet Scams with Jack Whittaker
Dating Scams - What Are the Warning Signs? with Joe Eweka
Business Ethics with Scott Stratten
Health and Wellness Scams with Natalia Petrzela
How to Travel Safely with Asher Fergusson
Call Center Scams with Ben Taylor
How Secure is "In the Cloud?" with Randall Magiera
Freelance Scams: Red Flags and Warning Signs with Ricardo Fayet
6 Basic But Effective Online Security Tips with Jordan Harbinger
Scams Targeting Website Owners with Liz Eisworth
The Risks of Online Gaming with Eric R. Jones
Building a Scammer Free Professional Network with Ken Rutkowski
How to Donate Wisely and Avoid Charity Scams with Laurie Styron
Internet Defamation with Kenton Hutcherson
Women's Safety Tips with Jessa Russell
20 Ways You Are Ruining Your Credit
7 Ways You Are Being Influenced with Dr. Robert Cialdini
Cybercrime Investigations with Ken Gamble
Surveillance and Student Privacy with Jason Kelley
Gaslighting with Dr. Deborah Vinall
Securing Your IoT Smarthome with Amanda Fennell
The Intersection of AI, IoT, and Blockchain
Preventing Identity Theft with Adam Levin
Attention Thieves with David Kadavy
Social Engineering and Pick-Pocketing with Chris Kirsch
School Safety and Security with Jason Stoddard
Situational Awareness with Robert Montgomery
Exposing Weakness Before It's Exploited with Jayson E. Street
Child Exploitation and Human Trafficking with Kevin Metcalf
The Rise and Risks of Cryptocurrency with Erica Stanford
The Dangers of Seeking Enlightenment with Caroline Slaughter
Preparedness Without Paranoia with Kathleen Kiernan
Cryptocurrency Exit Scams with Aaron Lammer
Resilience and Security with Kris Coleman
Stalkerware with Eva Galperin
Influence and Non-conscious Persuasion with Roger Dooley
People Hacking with Jenny Radcliffe
Sales Influence with Paul Ross
Child Exploitation with Dr. Deaneè Johnson
Amazon Scams with Shaahin Cheyene
Deep Fakes with Lonnie Waugh
Data Destruction with Paul Katzoff
Hacking with Alissa Valentina Knight
How to Spot a Liar with Pamela Meyer
Influencer Marketing with Neal Schaffer
Pet Scams with Brandi Hunter
Deception Detection with Abby Ellin
Ethical Hacking with Brian Self
Cyber Security for Seniors with Scott Schober
Ponzi Schemes with Steve Weisman
Psychopaths and Self-Protection with Mike Mandel
Privacy by Design with Nishant Bhajaria
Romance Scams with David McClellan
Surviving a Romance Scam with Debby Montgomery Johnson
Keeping Kids Safe Online with Susan McLean
Student Loan Scams with Robert Farrington
Women in Infosec with Eleanor Dallaway
Avoiding Mentoring Disasters with Mark Timm
Protecting Your Business with Dr. Mary C. Kelly
Protect Yourself - Real Life Scenarios with James Casey
Fraud Detection with Traci Brown
Scam Baiting with Jim Browning
Penetration Testing and Ethical Hacking with Ed Skoudis
Charity Scams with Michael Thatcher and Zachary Weinsteiger
Psychological Security with Adam Anderson
The Life of a Cybercriminal with Brett Johnson
Embezzlement with Kelly Paxton
Surveillance and Digital Rights with Danny O'Brien
Charity and Personal Finance Scams with Dori Zinn
You Can Stop Stupid with Ira Winkler
Disinformation and Misinformation with Morgan Wright
Dating Scams with Kezia Noble
Social Engineering with Jack Rhysider
Reputation Management with Chris Silver Smith
Conspiracy Theories with Dr. Michael Shermer
Managing Credit Cards with Sara Rathner
The Unexpected Cost of Privacy with John McAfee
Cybersecurity in the News with Graham Cluley
Privacy and Security with Rebecca Herold
Stalkerware with John Bambenek
SIM Swapping with Haseeb Awan
Narcissists, Psychopaths, and Sociopaths with Dr. Ramani Durvasula
Credit Card Skimming with Scott Schober
Tracking Scammers with Wayne May
Red Collar Crime with Richard Brody
Cyber Security Awareness with Jake Moore
Psychology of Scams with Dr. Stacey Wood
Hacking with James Kettle
Multi-level Marketing with Casey Bond
Workplace Bullying with Timothy Dimoff
Trust and Encryption with Casey Crane
Ransomware with Craig MacAlpine and Joel Witts
Identity Theft with Dana Mantilia
Website Attacks with John Graham-Cumming and Evan Johnson
Catfishing, Coronavirus, and Cybercrime, oh my, with Tyler Cohen Wood
Remote Worker Cybersecurity Risks with Dr. Eric Cole
Hoaxes with Alex Kasprak
Coronavirus Scam Vigilance with Frank Figliuzzi
Short Term Rental Scams with J. Massey
Business Email Compromise (BEC) Scams with Steve Weisman
Data Breaches with Troy Hunt
Likeness Theft with Jeffrey Hayzlett
Introduction