Michele

15: Easy Money! Get Rich Schemes

“You can get rich like me. Just buy my course to learn how!” Don't fall for it. Social media has made it a lot easier for scammers to sell you on a dream. Maybe they were early to the game and lucky to make a few bucks, but the opportunity (if it ever existed) is long gone.

Early and Lucky is the name of the game. Find out what it is, how to play it, and how not to lose your shirt on scammy get-rich schemes.

Resources:

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams and attacks too.

14: The Enigma of the Enigma

If you've seen The Imitation Game you've heard of the Enigma, the cryptographic machine used by the German military in WWII. Everything about the Enigma–how it was used, how it was solved–is echoed in the cryptographic methods we used in the past, today, and in the future.

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams and attacks too.

CrowdStrike Special

On July 19, the CrowdStrike outage was all over the news. But what was it really about, and what does it have to do with all of us? While the outage was repaired quickly, the fact that it affected so many systems we depend on is a wakeup call reminiscent of crippling cybersecurity attacks. In this episode, we look at what happened, how it relates to other outages including targeted cybersecurity attacks, and how we can protect ourselves from the fallout of such outages in the future.

Resources:

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams and attacks too.

12: Sneaky Phone Downloads

Your smart phone keeps busy, even when you're not on it. Apps are constantly downloading datathumbnails, ad content, new postsat a surprising frequency, even when you're not actively using the app. These downloads can lead to your download data making it look like you're using your phone when you're not. 

In this episode, I pull a story from my days in mobile forensics to show just how this constant downloading could get you in trouble one day, and how you can avoid such a fate.

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

Apple vs. The FBI and Your Right to Privacy

In response to the San Bernardino shooting in 2015, the FBI demanded that Apple, Inc. create a “back door” to bypass the shooter's iPhone security, a back door that could also compromise any iPhone, anytime. Thankfully, Apple CEO Tim Cook wasn't playing. But this isn't the first time government and law enforcement has tried to stick their noses into our business without permission, and probably won't be the last. In this episode we also talk about government efforts to compromise consumer security, like the NSA's Clipper Chip of 1993, and why these efforts have always failed.

Resources:

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

Buzzword Bingo: Deciphering the Lingo

Buzzwords are the language of business and marketing. But do they really live up to the hype? Find out how phrases like “end-to-end encryption” and “blockchain” are used to hype up a service that might not be what it seems. Join me on a journey through the world of buzzwords in cybersecurity marketing.

Resources:
Hackers steal nearly $10 million from Axie Infinity co-founder’s personal accounts
The Spectacular Collapse of CryptoKitties, the First Big Blockchain Game

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

10: Job Scams: Too Good to Be True

Have you gotten a dream job offer through WhatsApp, Facebook, or some other suspicious source? It's probably a scam. Let's look at how job scams work, and how you can spot them.

Report job scams in the USA to the Federal Trade Commission.

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

9: Is my phone spying on me? | Social Media Part III

Does your phone serve you content based on your conversations? It depends. 

This is the third episode in a three-part series on social media. Here we talk about what your apps or services might be listening to, and what you can do about it.

Resources:

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

8: Data Mining | Social Media Part II

What's your favorite Beatles song? Where did you get married? What's your dog's name? Whenever you answer a question on a random person's or company's post, you're giving up information to exploit you.

See what social media sites collect about you

Support the Show.

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

7: Social Media Part 1: Dude, Where’s My Data?

How do you find out what social media platforms know about you? Bet you didn't know you can grab your data anytime, all of it. In this episode, we talk about how to get all your data from a social media platform so you can see what they've stored.

For any other social media platforms, search for “download my data from [platform]” to find out how.

Support the show

Visit us on Patreon for bonus content and special offers! But only if you hate scams too.