Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.
Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
Everyone is being targeted by organized crime to separate you from your money. If you’ve been scammed, don’t allow embarrassment to keep you from reporting it. Your story could keep someone else from…
Romance scammers are patient and willing to take their time to win over their target. In today’s episode, we’ll talk about how you can help out and make a difference to reduce the impact of romance s…
Scammers try to take advantage of human politeness. Utilizing critical thinking and slowing down conversations with someone who claims to be an authority like a government agency or bank could be wha…
The burden is on consumers to question the validity of online offers because privacy laws and standards are not yet well regulated. Consumer Reports is fighting to make changes in this arena. Today’s…
Scammers have used our systems against us, like shipping, rental cars, and rental homes. They’ve learned how to stay off the radar and, in order to stop money laundering, we need to address fraud one…
We’ve heard the polarizing narrative, “Either you’re with me or you’re my enemy.” Using this polarizing statement can allow people to fall prey to being manipulated. Today’s guest is Sander van der L…
Scammers, like magicians, use distractions and illusions to keep you from realizing what is really going on. They may choose to have you focus on something that is urgent hoping that you’ll make mist…
Our home IoT devices are constantly being probed for weaknesses so that they can be compromised and used for broader nefarious purposes like cyber warfare. The Ukrainians may be considered some of th…
Our non-verbal communication is as much or more important than what we verbally communicate. We may display mannerisms that our gut instincts pick up as just off, but a trained FBI Behavioral Analysi…
Many people have ended up in an MLM because they wanted to help a friend out. But it is important to understand the red flags of how they can motivate and manipulate. Today’s guest is Roberta Blevins…
A scalpel in the hand of a surgeon can be an amazing instrument. But the same tool in the hand of a person choosing to do harm is dangerous. The knowledge on how to read someone’s behavior is the sam…
It can be difficult to quantify the impact of good CISO or IT professionals. Protecting the network, infrastructure, and data is a constant effort and they’ve got to get it right 100% of the time. Bu…
Today’s guest is Bryan Seely, a world famous cyber security expert, ethical hacker, author, keynote speaker, and former US Marine. He is known for intercepting calls to the US Secret Service and FBI.…
The cyber security circle of information will always have some human involvement and raising awareness in how systems were designed, developed, used, and abused is critical. Today’s guest is Dr. Jess…
With the appearance of health taking focus in today’s culture, many are persuaded to try extreme trends to achieve quick weight and health results. Conventional healthcare may not always have the ans…
In this episode, we look at two sides of the Nigerian scam: The emotional, psychological, and financial damage done by scammers and the scammers we often look at as bad people doing bad things. But i…
Recovering from identity crimes can be daunting and take a toll on your entire life, not just financially and emotionally. Once someone gains access to one of your accounts, they can work to manipula…
You may be shocked to know that master manipulators utilize special tactics to impact human behavior and emotions by more than just instilling a sense of urgency. The art of persuasion can be used fo…
Phishing emails are constantly evolving to take advantage of current trends, news, and holidays. Typically poor grammar or the time an email was sent could help you identify if it is authentic. But w…
Age appropriate conversations need to be taking place with children on how technology is being used to groom them. Unfortunately, many are already addicted to the dopamine fix and their relationships…