QR codes are a super convenient way to access a website or app from your phone without having to type anything in. And while some scammers use QR codes to try and steal your personal information and money, most QR codes are just fine. Learn how to spot a scammy QR code so you can use them safely, and confidently enjoy all the conveniences they offer. Resources: Thieves are using fake QR codes on parking meters to scam drivers. Here's how to protect yourself FBI issues new warning about QR code s...
Nov 06, 2024•25 min•Season 3Ep. 2
How can you keep hackers from getting your Social Security Number? You can't. Between breaches of Equifax, the healthcare industry, and the recent National Public Data leak, your SSN is probably already making the rounds on the dark web. But you can fight back with some simple security measures. In this episode, we call back to our very first episode on the Equifax breach of 2017, and revisit the lessons learned and how they pertain to cybersecurity today, and in the future. Resources Krebs on S...
Oct 23, 2024•27 min•Season 3Ep. 1
A new bank regulation in the United Kingdom promises refunds to customers who are victims of fraud through bank transfers. We'll likely see the same regulations in other countries soon, and it will likely lead to banks getting up in our business about who we transfer money to, so they won't be on the hook for fraud. Is this a good thing? Let's discuss. Resources Groundbreaking new protections for victims of APP scams start today The Perfect Scam podcast: You May Not Be a Winner: Sweepstakes Scam...
Oct 16, 2024•22 min•Season 2Ep. 21
Pump and dump, rug pull... what do these terms mean? Host Michele Bousquet explains how scammy cryptocurrency schemes work, how they relate to illegal practices in the stock market, and how you can spot them so you don't fall for them. Resources A Brief History of the Stock Market and Stock Exchanges Investopedia: Forces That Move Stock Prices SEC: Pump and Dump Schemes Investopedia: What are Penny Stocks? Skinning The Wolf of Wall Street: Victims Speak Out Faze Clan Members Skewered By Fans Fol...
Oct 09, 2024•25 min•Season 2Ep. 20
Is any telemarketing actual real anymore? Here we delve into the history of telemarketing, and how it was always a little scammy, even before the era of endless scam phone calls. Resources Time Life Published Book Series MCI Long-Distance Overcharges Consumer Alert: Telemarketing Scams Send us a text Support the show Join our Patreon to listen ad-free!...
Oct 02, 2024•19 min•Season 2Ep. 19
It's not about pork, it's about stealing your money. Pig Butchering is a devastating scam, a long con that fools people into forking over their life savings for a bogus investment. Pig Butchering takes thousands of people every year for billions of dollars, most of it from the elderly. Find out what Pig Butchering is, how to spot it when it comes your way, and how to keep your friends and loved ones from falling for it. Resources Office of the Inspector General: Pig Butchering Scams FBI Cryptocu...
Sep 25, 2024•22 min•Season 2Ep. 18
Why does ChatGPT lie? It's a great tool for research, but sometimes "hallucinates" its answers. By that I mean, it tells outright lies. Find out how to spot when ChatGPT is being a fool, and how to avoid getting duped by its responses. Resources: Here’s What Happens When Your Lawyer Uses ChatGPT Disciplinary judge approves lawyer's suspension for using ChatGPT to generate fake cases New York lawyers sanctioned for using fake ChatGPT cases in legal brief Mata v. Avianca, Inc. The Art and Math of ...
Sep 18, 2024•17 min•Season 2Ep. 17
You’ve probably seen content generated by AI (artificial intelligence) because it’s all around us: on the internet, in advertising, and worst of all, in your DMs. Come on down for a wild ride through the world of AI-generated images, and how scammers are taking advantage of the technology to run their schemes. Resources: Families Scammed by AI Images That Promised Willy Wonka-Style Event Artists Copyright Claims Against AI Image Generators Advance in Court Georg Nees: Computer Art and Graphics A...
Sep 11, 2024•25 min•Season 2Ep. 16
"You can get rich like me. Just buy my course to learn how!" Don't fall for it. Social media has made it a lot easier for scammers to sell you on a dream. Maybe they were early to the game and lucky to make a few bucks, but the opportunity (if it ever existed) is long gone. Early and Lucky is the name of the game. Find out what it is, how to play it, and how not to lose your shirt on scammy get-rich schemes. Resources: Logan Paul promises CryptoZoo refunds, as long as you don’t sue him Logan Pau...
Aug 28, 2024•26 min•Season 2Ep. 15
If you've seen The Imitation Game you've heard of the Enigma, the cryptographic machine used by the German military in WWII. Everything about the Enigma--how it was used, how it was solved--is echoed in the cryptographic methods we used in the past, today, and in the future. Send us a text Support the show Join our Patreon to listen ad-free!...
Aug 14, 2024•13 min•Season 2Ep. 14
On July 19, the CrowdStrike outage was all over the news. But what was it really about, and what does it have to do with all of us? While the outage was repaired quickly, the fact that it affected so many systems we depend on is a wakeup call reminiscent of crippling cybersecurity attacks. In this episode, we look at what happened, how it relates to other outages including targeted cybersecurity attacks, and how we can protect ourselves from the fallout of such outages in the future. Resources: ...
Aug 01, 2024•21 min•Season 2Ep. 13
Your smart phone keeps busy, even when you're not on it. Apps are constantly downloading data – thumbnails, ad content, new posts – at a surprising frequency, even when you're not actively using the app. These downloads can lead to your download data making it look like you're using your phone when you're not. In this episode, I pull a story from my days in mobile forensics to show just how this constant downloading could get you in trouble one day, and how you can avoid such a fate. Send us a t...
Jul 10, 2024•10 min•Season 2Ep. 12
In response to the San Bernardino shooting in 2015, the FBI demanded that Apple, Inc. create a "back door" to bypass the shooter's iPhone security, a back door that could also compromise any iPhone, anytime. Thankfully, Apple CEO Tim Cook wasn't playing. But this isn't the first time government and law enforcement has tried to stick their noses into our business without permission, and probably won't be the last. In this episode we also talk about government efforts to compromise consumer securi...
Jun 26, 2024•14 min•Season 2Ep. 11
Buzzwords are the language of business and marketing. But do they really live up to the hype? Find out how phrases like "end-to-end encryption" and "blockchain" are used to hype up a service that might not be what it seems. Join me on a journey through the world of buzzwords in cybersecurity marketing. Resources: Hackers steal nearly $10 million from Axie Infinity co-founder’s personal accounts The Spectacular Collapse of CryptoKitties, the First Big Blockchain Game Send us a text Support the sh...
Jun 12, 2024•16 min•Season 2Ep. 11
Have you gotten a dream job offer through WhatsApp, Facebook, or some other suspicious source? It's probably a scam. Let's look at how job scams work, and how you can spot them. Report job scams in the USA to the Federal Trade Commission . Send us a text Support the show Join our Patreon to listen ad-free!...
May 29, 2024•7 min•Season 2Ep. 10
Does your phone serve you content based on your conversations? It depends. This is the third episode in a three-part series on social media. Here we talk about what your apps or services might be listening to, and what you can do about it. Resources: Does Your Phone Listen to You for Ads? (Yes, Here’s How) This Company Might Be Listening to Everything You Watch on TV That Game on Your Phone May Be Tracking What You’re Watching on TV Is your smartphone listening to you? Send us a text Support the...
May 15, 2024•10 min•Season 2Ep. 9
What's your favorite Beatles song? Where did you get married? What's your dog's name? Whenever you answer a question on a random person's or company's post, you're giving up information to exploit you. See what social media sites collect about you Send us a text Support the show Join our Patreon to listen ad-free!...
May 01, 2024•14 min•Season 2Ep. 8
How do you find out what social media platforms know about you? Bet you didn't know you can grab your data anytime, all of it. In this episode, we talk about how to get all your data from a social media platform so you can see what they've stored. Get your data from Facebook Get your data from Instagram Get your data from LinkedIn Get your data from Snapchat Get all your Google emails, photos, YouTube videos For any other social media platforms, search for "download my data from [platform]" to f...
Apr 17, 2024•8 min•Season 2Ep. 7
What is an NFT, and why would anyone want to buy one? There are lots of reasons why someone might buy a certified JPG or other NFT, but there's no guarantee your NFT will increase in value or even retain the value you paid for it. In this episode, host Michele Bousquet talks about different kinds of NFTs on the market, how they compare to physical art items, and how fraudsters have found a rich source of free funds in NFT theft. Sources: Joey Mars website Investors sue Sotheby's, Justin Bieber, ...
Apr 03, 2024•17 min•Season 2Ep. 6
The story of Silk Road, the underground website where you could buy and sell anything, is now part of internet lore. Customers could order everything from pot to meth and have it delivered to their door. Then came fake IDs, unregistered guns, poisons, and murder-for-hire. But wherever there's illegal activity and lots of money, violence isn't far behind. This episode takes you on a very quick tour of the rise and fall of Silk Road, which met its demise in 2013 when founder Ross Ulbricht got caug...
Nov 14, 2023•24 min•Season 2Ep. 5
Well, it finally happened: I got scammed! I bought a high-end projector at a price that was too good to be true, because it wasn't true. Don't fall for the White Van scam! White van speaker scam on Wikipedia The Art and Math of Cryptography at Amazon.com Send us a text Support the show Join our Patreon to listen ad-free!...
Sep 27, 2023•9 min•Season 2Ep. 4
In October 21, 2021, Josh Renaud, a reporter for the St. Louis Post-Dispatch newspaper, privately alerted a government authority that their website had vulnerabilities. In response, the governor of Missouri, Michael L. Parson, brought charges against the journalist for "hacking." This story would be hilarious if it wasn't true. Update: In July 2022, Josh Renaud was awarded The National Press Club press freedom award for his work. Get the "F12 IS NOT A CRIME" T-shirt Original St. Louis Post-Dispa...
May 24, 2023•10 min•Season 2Ep. 3
You get an email telling you you've been billed for a product you never ordered, and when you call for a refund, you somehow you get an excess refund and have to send back the difference. Find out how scammers manipulate people into sending them "excess refund money" from a nonexistent refund, and what you can do to keep it from happening to others. Shout-out to YouTuber Kitboga for showing me how this scam works. Send us a text Support the show Join our Patreon to listen ad-free!...
Dec 16, 2022•10 min•Season 2Ep. 2
What is Tor? In this episode, we demystify the Tor browser and how it relates to the Surface Web, the Deep Web, and the Dark Web. Maybe you want to use Tor, and maybe you don't. But in any case you'll know what it is, and will be able to decide if it's right for you. Download the Tor browser at the official site A great read about the dark web at Wired.com Get the T-shirt! Fly your Tor flag. Send us a text Support the show Join our Patreon to listen ad-free!...
Oct 26, 2022•19 min•Season 2Ep. 1
What we can we learn about hacks, scams, and fraud from TV shows and movies? Plenty, as it turns out. Fictional shows, documentaries, podcasts, and other types of entertainment are a treasure trove of knowledge. Don't discount the education you can get about scams, con games, legal proceedings, police procedure, and other aspects of safety, all while being thoroughly entertained. Send us a text Support the show Join our Patreon to listen ad-free!...
Mar 04, 2022•17 min•Season 1Ep. 14
The Tinder Swindler is a fascinating Netflix documentary about a serial romance scammer who took each of his "girlfriends" for more than $100,000 each. In this episode, we look at what we can learn from The Tinder Swindler, going beyond the easy "blame the victim" mentality to show how effective such scams can be, and to point out the individual red flags you should watch out for in any new romance. Resources for this episode: The Tinder Swindler documentary on Netflix Tinder Dating Safety Tips ...
Feb 20, 2022•17 min•Season 1Ep. 13
The hack of Sony Pictures Entertainment in 2014 was one of the most bizarre crimes of the decade. Instead of demanding money, the hackers threatened a terrorist attack on the USA if Sony didn't cancel the release of the film 'The Interview,' a comedy about two bumbling journalists who travel to North Korea and attempt to assassinate the country's Supreme Leader. The release went forward anyway, and thankfully, the threats came to nothing. Enjoy the terrible English in the hackers' written threat...
Feb 01, 2022•25 min•Season 1Ep. 12
Why are older people so susceptible to scams? There could be a relationship to the music you loved in your teen years. Just as most of us have a Musical Peak in our teens, I propose that we also have a Technology Peak in our 20s-40s. Nudging our elderly relatives out of their Technology Peak, and into the present, is the only way to break this pattern. And the only way to do it is by showing them. References: Study of link between adolescent age and music preference: https://journals.sagepub.com...
Jan 15, 2022•12 min•Season 1Ep. 11
What would you do if your identity was stolen, if you found out someone was using it to take out credit cards, steal your tax refund, or even raid your bank account? Meet Tiffany, Pete, and Astrid, three victims of identity theft. Find out how each of them discovered the fraud, what they did to reverse the damage, and what they do now to prevent it from happening again. Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on:...
Jan 01, 2022•48 min•Season 1Ep. 10
How are bike thieves like hackers? Both look for the same kinds of vulnerabilities, including easy-to-crack passwords. Would you leave your bike's combination at the default of 0000? Of course not. In the same way, you should change default passwords and use something that a hacker won't find easy to crack. Be safe out there! Send us a text Support the show Join our Patreon to listen ad-free!...
Dec 15, 2021•4 min•Season 1Ep. 9