1. EachPod
EachPod
Easy Prey - Podcast

Easy Prey

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

Tech News News True Crime
Update frequency
every 7 days
Average duration
43 minutes
Episodes
288
Years Active
2020 - 2025
Share to:
Safe AI Implementation

Safe AI Implementation

Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures. It is vital to educate users about how to explore the challenges and…

00:46:47  |   Wed 23 Apr 2025
The Art of Espionage

The Art of Espionage

What makes someone betray their country? It’s rarely just about money. In this episode, you’ll hear from a retired CIA officer who spent 25 years recruiting foreign spies by tapping into something de…

00:43:12  |   Wed 16 Apr 2025
Understanding Ransomware and Defense Strategies

Understanding Ransomware and Defense Strategies

When it comes to cybersecurity, most people think about firewalls, passwords, and antivirus software. But what about the attackers themselves? Understanding how they operate is just as important as h…

00:41:20  |   Wed 09 Apr 2025
Privacy and Surveillance

Privacy and Surveillance

Ever had that creepy feeling someone's watching you online? Now imagine if that feeling was actually your reality, not just your browsing history being tracked, but cameras following your every move …

00:43:36  |   Wed 02 Apr 2025
Navigating Data Brokering and Privacy

Navigating Data Brokering and Privacy

In a world where data is more important than ever, understanding how it is acquired, shared, and misused is critical. Data brokers work behind the scenes, amassing enormous amounts of personal inform…

00:36:23  |   Wed 26 Mar 2025
Be Your Own Fraud Prevention Hero

Be Your Own Fraud Prevention Hero

Getting defrauded is common. It happens everywhere but it’s underreported because of embarrassment. If you’re a victim of fraud the sooner you report the more likely you are to get a better outcome.

00:46:02  |   Wed 19 Mar 2025
Empowering the Vulnerable

Empowering the Vulnerable

In cybersecurity, we need to understand the mindset of hacking, which is not ethics. We also need to realize that even if we have cybersecurity experts get hacked, there is no reason to feel embarras…

00:40:43  |   Wed 12 Mar 2025
How Not to Money with Joel Larsgaard

How Not to Money with Joel Larsgaard

Managing money isn’t about numbers, it's about making informed decisions that shape your future. Whether you’re a seasoned saver or just starting out on your financial journey understanding the basic…

00:45:06  |   Wed 05 Mar 2025
Brushing Scams with Venkat Margapuri

Brushing Scams with Venkat Margapuri

Scams come in many forms but receiving a freebie from a scammer doesn’t make sense. If something shows up at your door that you didn’t order, should you be worried? Brushing scams are becoming more c…

00:33:26  |   Wed 26 Feb 2025
Ransomware, Phishing and Fraud

Ransomware, Phishing and Fraud

Cybersecurity isn't just a concern for large corporations. It's vital for businesses of all sizes. It's essential for companies to know how to protect sensitive data, restore from backups, and regula…

00:44:31  |   Wed 19 Feb 2025
CISOs: The Ultimate Stress Test With Jill Knesek

CISOs: The Ultimate Stress Test With Jill Knesek

The CISO role is constantly changing. With all the shifts in cybersecurity, it's crucial to find ways to attract new talent to close the growing skills gap. CISOs now juggle complex systems managed a…

00:45:25  |   Wed 12 Feb 2025
AI, Automation, and the Future of Cybersecurity With Mike Lyborg

AI, Automation, and the Future of Cybersecurity With Mike Lyborg

With the increase in targeted cyber attacks, it's more important than ever for organizations to quickly identify and respond to threats. AI is helping security teams by acting as virtual analysts, ha…

00:41:39  |   Wed 05 Feb 2025
Cybersecurity Training from Boring to Engaging With Howard Goodman

Cybersecurity Training from Boring to Engaging With Howard Goodman

The landscape of cybersecurity training and collaboration is changing, interactive education sessions and cross team communication is key. Building a security culture and staying ahead of the modern …

00:40:07  |   Wed 29 Jan 2025
Next-Gen Account Security with Christiaan Brand

Next-Gen Account Security with Christiaan Brand

With phishing and password breaches on the rise, passkeys could offer a more secure, user-friendly solution that could reshape how we protect our online identities. Today's guest is Christiaan Brand.…

00:43:50  |   Wed 22 Jan 2025
5 Key Cybersecurity Elements with Kelly Hood

5 Key Cybersecurity Elements with Kelly Hood

How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they're redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implement…

00:42:37  |   Wed 15 Jan 2025
Identity Crimes (Theft, Compromise & Misuse) with Mona Terry

Identity Crimes (Theft, Compromise & Misuse) with Mona Terry

When you search for customer service numbers online, you might come across a scammer’s number instead. It’s important to be cautious when sharing personal information, and to verify identities before…

00:32:48  |   Wed 08 Jan 2025
Why Resolutions Fail with Dr. Leslie Becker-Phelps

Why Resolutions Fail with Dr. Leslie Becker-Phelps

We often put off changes and schedule them to start on January 1st. Many of these idealistic resolutions fail shortly after beginning, so it is important to be thoughtful when planning so that you ca…

00:39:27  |   Wed 01 Jan 2025
Erasing Your Digital Footprint with Jeff Jockisch

Erasing Your Digital Footprint with Jeff Jockisch

Data is continuously being collected and this information can lead to misleading conclusions about an individual. Without proper context, behavior can be misinterpreted. This underscores the need for…

00:35:36  |   Wed 18 Dec 2024
Executive Recruiter Scams with John Sidoti

Executive Recruiter Scams with John Sidoti

When a recruiter contacts you, it’s essential to do your homework, verify their sources, and trust your instincts. If something seems too good to be true, it probably is. While it can be frustrating …

00:37:27  |   Wed 11 Dec 2024
Human Hacking with Peter Warmka

Human Hacking with Peter Warmka

Today’s threat actors and social engineers leverage social media to observe individuals’ patterns and habits. They encounter you at a coffee shop or another familiar spot. They begin to establish tru…

00:53:02  |   Wed 04 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Chris Parker. This content is not affiliated with or endorsed by eachpod.com.