Easy Prey
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

Episoder(321)

Stolen Identity - Stolen Peace

Stolen Identity - Stolen Peace

Identity theft gets talked about a lot, but usually in the abstract: freeze your credit, watch your statements, don't click suspicious links. What doesn't get talked about nearly enough is what it act...

4 Mar 52min

Inside Modern Fraud

Inside Modern Fraud

Fraud doesn't always announce itself with obvious warning signs. Quite often, it shows up wrapped inside something that feels routine — a purchase you've made before, a link that looks legitimate, a m...

25 Feb 42min

Money Laundering

Money Laundering

Organized crime is often imagined as something violent, chaotic, and obvious. But today, it looks far more polished than that. It operates like a multinational business, spread across borders, built o...

18 Feb 46min

Critical Infrastructure Risks

Critical Infrastructure Risks

Most cybersecurity conversations focus on stolen data, breached accounts, and attacks that live entirely on screens. This episode looks at a far more consequential threat: what happens when cyberattac...

11 Feb 38min

Familial Identity Theft

Familial Identity Theft

Identity theft is usually framed as an external threat. Hackers, data breaches, anonymous criminals operating somewhere far away. This episode looks at a much harder reality to face: identity theft th...

4 Feb 37min

Exploiting Trust (Part 2)

Exploiting Trust (Part 2)

Security failures rarely come from cutting-edge attacks or sophisticated tools. They happen in ordinary moments when someone holds a door, follows an instruction without questioning it, or finds a wor...

28 Jan 50min

Exploiting Trust (Part 1)

Exploiting Trust (Part 1)

Most security failures don't start with a dramatic breach or a mysterious hacker sitting in a dark room. They usually start quietly. Someone assumes a system is locked down. Someone trusts that a door...

21 Jan 48min

Surviving a Ransomware Attack

Surviving a Ransomware Attack

A ransomware attack doesn't always announce itself with flashing warnings and locked screens. Sometimes it starts with a quiet system outage, a few unavailable servers, and a sinking realization days ...

14 Jan 47min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
lydartikler-fra-aftenposten
rss-gukild-johaug
det-store-bildet
nokon-ma-ga
dine-penger-pengeradet
rss-ness
hanna-de-heldige
aftenbla-bla
rss-espen-lee-usensurert
rss-penger-polser-og-politikk
e24-podden
rss-dannet-uten-piano
frokostshowet-pa-p5