Credit Card Skimming with Scott Schober
Easy Prey8 Heinä 2020

Credit Card Skimming with Scott Schober

We've all had that random fraudulent charge show up on our credit card and we wonder how did that happen. Do I need to cancel my credit card? Do I need to get a new one? Today we talk about credit card skimming with Scott Schober.

Scott Schober is the president and CEO of Berkeley Varitronics Systems, a 48-year-old leading provider of advanced world-class wireless test and cybersecurity solutions. Scott is a highly sought after author and expert for live security events, media appearances, and commentary on ransomware, wireless threats, drone surveillance hacking, and cybersecurity for consumers and small businesses. He is the author of Hacked Again and Cybersecurity is Everybody's Business.

Scott shares his many experiences about personally being hacked and finally getting the money back. We talk about what you need to know, how to protect yourself, and more.

Show Notes:
  • [01:02] - Scott shares how he got involved in cybersecurity.
  • [02:01] - Cybercriminals want to silence you. They don't want you to share tips or expertise on how to keep companies secure or even individuals. These attacks lead to the creation of his first book, Hacked Again.
  • [03:02] - In that process, he learned that there were some fundamental things that they were doing wrong. So he had to relearn and reimplement best practices for the company and himself.
  • [03:34] - We should create more secure passwords and not use them across multiple sites.
  • [06:14] - Anonymity is extremely powerful in the criminal empire. Criminal gangs often get educated to conduct criminal activity.
  • [08:42] - We can now use technology to fight back.
  • [10:29] - The challenge is to get the skimmers out before it even happens.
  • [12:02] - Follow the money and it usually tells you why things are done or not done.
  • [14:12] - Scott uses Apple Pay and Google Wallet when possible.
  • [15:22] - When you're at a gas station use cash if you are afraid of a skimmer. Use common sense. If things look like they have been tampered with, use caution.
  • [17:17] - The part of the iceberg sticking out of the water is the surface web that we use for searches and purchases. Below is tons of information that don't make a lot of sense to us working at the surface web.
  • [19:38] - If you see a small transaction on your credit card ($0.50/$1) it could likely be that it is on the dark web and has been posted to be tested.
  • [21:37] - It is hard for law enforcement because this is an attractive way to make money.
  • [22:50] - Don't be complacent. Start out by doing best practices across the board in your personal life and business.
  • [23:12] - The best thing to do is to add layers of security like multi-factor or two-step authentication.
  • [24:29] - Scott doesn't share his actual birthday on social media, because that is one of the critical pieces of information if someone tries to compromise your identity.
  • [26:07] - When setting up security questions put a password instead of the actual answer that can be researched about you.
  • [27:42] - They discuss the pros and cons of freezing your credit.
  • [29:25] - The process and investigation when Scott lost $65,000 took months, but he did finally did get the money back.
  • [31:28] - Cybercriminals create fictitious accounts, steal money from multiple people in a bank, and quickly close them out.
  • [33:32] - You can do things to prevent it from happening to you.
  • [35:49] - You can't be too trusting to anyone. Don't use their means of communication to verify.
  • [37:49] - Take a few minutes to question everything. Use caution.
  • [40:07] - Many of these scams look very convincing.
  • [42:50] - Your better to spend the time and effort upfront securing things then pay for it later.
  • [44:04] - A small business owner can do small practical things to protect themselves.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit