Mobile Device Threats
Easy Prey31 Joulu 2025

Mobile Device Threats

In a world where we're told to carry our entire lives in our pockets, we've reached a strange tipping point where the very devices meant to connect us have become windows into our private lives for those who wish us harm. It's no longer a matter of looking for the "shady" corners of the internet; today, the threats come from nation-state actors, advanced AI, and even the people we think we're hiring. We are living in an era where the most sophisticated hackers aren't just trying to break into your phone, they're trying to move into your business by pretending to be your best employee.

Joining the conversation today is Jared Shepard, an innovative industry leader and the CEO of Hypori. A U.S. Army veteran with over 20 years of experience, Jared's journey is far from typical; he went from being a high school dropout to serving as a sniper and eventually becoming the lead technical planner for the Army's Third Corps. He is also the founder of Intelligent Waves and the chair of the nonprofit Warriors Ethos, bringing a perspective shaped by years of advising technologists in active war zones.

We're going to dive deep into why Jared believes everything you own should be considered already compromised and why that realization is the first step toward true security. From the terrifying reality of his own 401k being stolen via identity theft to the future of "dumb terminals" that protect your privacy by storing nothing at all, this discussion challenges the status quo. We'll explore how to navigate a future where AI can fake your identity in real-time and why the ultimate battle in cybersecurity isn't against a specific country, but against our own human tendency toward laziness.

Show Notes:
  • [[02:12] Jared Shepard of Hypori is here to discuss how modern cyber threats actually play out in real life.
  • [04:48] How modern attacks unfold slowly instead of triggering obvious alarms.
  • [05:55] Why many victims don't realize anything is wrong until secondary systems start failing.
  • [07:56] What identity theft looks like when accounts are targeted methodically over time.
  • [08:48] How attackers prioritize persistence and access over immediate financial gain.
  • [10:32] A real attempt to take over long-term financial accounts and how it surfaced.
  • [13:07] Why financial institutions often respond late even when fraud is already underway.
  • [15:44] The limits of traditional identity verification in an AI-driven threat environment.
  • [16:52] Why layered authentication still fails when underlying identity data is compromised.
  • [18:21] Deepfakes, voice cloning, and why video calls no longer prove much.
  • [20:57] How laptop farms are used to bypass hiring controls and internal access checks.
  • [22:18] Why insider-style access is increasingly coming from outside the organization.
  • [23:33] Why some companies are quietly bringing back in-person steps for sensitive roles.
  • [26:09] SIM farms, mobile identity abuse, and how scale changes detection.
  • [28:47] The growing tension between personal privacy and corporate device control.
  • [31:22] Why assuming device compromise changes everything downstream.
  • [33:58] Isolating data from endpoints instead of trying to secure the device itself.
  • [35:12] How moving compute and data off the endpoint reduces exposure without requiring device monitoring.
  • [36:35] How pixel-only access limits data exposure even on compromised hardware.
  • [39:11] Why AI training data introduces new security and poisoning risks.
  • [41:46] Why recovery planning is often overlooked until it's too late.
  • [44:18] The problem with victim-blaming and how it distorts security responses.
  • [46:52] Why layered defenses matter more than any single tool or platform.
  • [47:58] What practical preparation looks like for individuals, not just enterprises.
  • [49:12] Rethinking privacy as controlled access rather than total lock-down.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit