Security Gaps Hackers Exploit
Easy Prey14 Touko 2025

Security Gaps Hackers Exploit

Scammers aren't just phishing your inbox anymore—they're impersonating your voice, your face, and even your coworkers. Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale. What used to take a hacker hours and expensive tools can now be done in minutes by anyone with a Wi-Fi connection and a little malicious intent.

Our guest today is Aaron Painter, CEO of Nametag, a company leading the charge in next-generation identity verification. Aaron's background includes 14 years at Microsoft and executive roles in cloud tech across Europe and Asia. After witnessing firsthand how easily identity theft could unravel lives—especially during the shift to remote everything—he founded Nametag to answer a critical question: how can we know who's really behind the screen? With Nametag, Aaron is building real-time, high-security ID checks that are already reshaping how help desks and businesses protect users.

In this conversation, we unpack the difference between authentication and identity, why traditional methods like security questions are dangerously outdated, and how mobile tech and biometrics are changing the game. Aaron also shares practical tips on protecting your most valuable digital asset—your email—and what consumers and companies alike can do to stay ahead of evolving threats. This one's packed with insight, and more relevant than ever.

Show Notes:
  • [00:54] Aaron is the CEO of Nametag. A company he started 5 years ago that focuses on identity verification at high-risk moments.
  • [01:37] He spent 14 years at Microsoft working on product including at Microsoft China. He also ran a cloud computing company that was AWS's largest partner in Europe.
  • [02:12] When everything went remote in 2020, he discovered that there were identity verification issues over phone lines.
  • [03:03] He began building technology that will help accurately identify people when they call in to support or help desks.
  • [04:22] Most of what we think of as identity is really just authentication.
  • [07:41] A common new challenge is the rise of remote work and people having to connect remotely. The rise of technologies that make it easier to impersonate someone is also a problem.
  • [10:38] Knowing who you hire and who you're working with matters.
  • [11:03] Deep fakes and voice cloning has become so much easier.
  • [15:47] How platforms have a responsibility to know their users.
  • [18:11] How deep fakes are being exploited in the corporate world.
  • [19:30] The vulnerability is often the human processes. Back doors and side doors are deleting ways that companies are breached.
  • [23:53] High value accounts and companies that know they have something to protect our early adopters of Aaron's technology.
  • [24:50] Identity verification methods including using mobile phones. The device has cryptography.
  • [27:07] Behavioral biometrics include the way we walk or the way we type.
  • [29:56] If you're working with a company that offers additional security tools, take them up on it.
  • [34:04] Dating sites are starting to do verification profiles.
  • [43:07] We all need to push for more secure ways to protect our accounts.
  • [43:48] The importance of protecting your email.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit