X

Recent Episodes

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim, being manipulated, or being taken advantage of.

All Episodes

Child Safety Tips with Steve Lazarus
Fraud: Not Going Away with Steve Lenderman
Phishing Attack Awareness and Training with Josh Bartolomie
Consumer Education for Fraud Protection with Doug Shadel
Educating Teens About Technology with Clayton Cranford
Protecting Financial Accounts From Scams and Fraud with John Buzzard
AI: Doomsday vs. A Very Bad Day with Dr. Robert Blumofe
Preventing SIM Swapping Scams with Mark Kreitzman
The Problem with Not Reporting Scams with Kathy Stokes
The Difference Between Frauds and Scams with Uri Rivner
Sex Trafficking and Murder on the Road with Frank Figliuzzi
Next Gen Romance Scams with Anna Rowe
Challenges of employee on-boarding and off-boarding with Craig Davies
5 Common Uses of Synthetic ID’s with Stuart Wells
Vantage Travel Bankruptcy with Michelle Couch-Friedman
Cybersecurity for Everyday People with Greg Tomchick
Misunderstanding Victims of Romance Fraud with Becky Holmes
Scams Exploiting Emotions with Alan Castel
3 Types of Insider Fraud with Claire Mullett
5 Fraud Vulnerability Factors with Martina Dove
Hackers Tactics with John Hammond
Top 5 Supply Chain Risks with Kevin Kumpf
The Risk & Rewards of Cryptocurrencies with Natalie Brunell
Tax Scams with Richard Gilbert
Virtual Kidnapping with Titania Jordan
Balancing Privacy, Security and Accountability with Kurt Long
5 alerts to prevent identity theft with Paige Hanson
Advances in Everyday Tech with Leo Laporte
Financial Exploitation of Older Adults with Joyce Petrowski
Advances in Crypto with Bam Azizi
How Minds Change with David McRaney
The Intersections of Technology and Domestic Violence with Audace Garnett
4 ways to reduce cybercrime with Roger Grimes
Fake vs Taken Over Accounts with Jason Kent & Will Glaizer
The Changing World of Data Breaches with Troy Hunt
When Conservatorships go Wrong with Diane Dimond
5 Things to Teach Your Kids about Predators with Michael Buraimoh
The Evolution of Digital Identity with Philipp Pointner
Preventing and Reporting Cyber Attacks with Robert Karas
Support to Navigate the Justice System with Rachel Gibson
Human Trafficking into Scam Call Centers with Matt Friedman
Active Shooter Preparedness with Katherine Schweit
The Passwords are the problem with Thierry Gagnon & Philippe Desmaris
5 Ways to Stay Safe Online with Patrick McNamera
Tracking Down Scammers with Ryan Kelly
World Romance Scam Prevention Day 10/3 with Kathy Waters and Bryan Denny
Stoppping Financial Fraud with Giles Mason
Buyer Beware with Marta Tellado
Scammer Payback with Pierogi
Being Foolproof to Misinformation with Sander van der Linden
Why We Fall for Scams with Chris Chabris & Dan Simons
Securing IoT & Cyber Warfare with Mikko Hypponen
Behavioral Analysis from an FBI expert with Robin Dreeke
7 Red Flags of MLM with Roberta Blevins
Reading and Understanding Behavior with Chase Hughes
Ever-changing Cybercrime with Raj Samani
What NOT to do when wiretapping the government with Bryan Seely
The Human Side of Cybersecurity with Jessica Barker
Diet Culture and Wellness Traps with Christy Harrison
New & Improved Nigerian Scams with Ronnie Tokazowski
10 Types of Identity Crimes with Eva Velasquez
The Science of Social Engineering with Chris Hadnagy
Preventing Email Attacks with Kiri Addison
The Balance Between Privacy and Protection with John Pizzuro
Intersection of AI and Cybersecurity with Paul Valente
Financial Vulnerability and Social Isolation with Marti DeLiema, PhD
Employment Scams Are On The Rise with Mike Kiser
The Impact of the Metaverse with Mark van Rijmenam
Questions to ask when Vetting a Job Offer with Jeff Lerner
Predicting Network Vulnerability with Hari Ravichandran
The Importance of Testing your Cybersecurity Response with Steve Orrin
Crypto Fraud and Recovery Scams with Nick Smart
A Mentalist, Psychic and Magician Walk Into A Bar with Mark Edwards
Cybercrime is Costing Us More Than Just Money with Rory Innes
The 4 P’s of Scams with Anthony ‘AJ’ Monaco
5 Ways to Manage Your Reputation with Darren Dunner
3 Steps to Take After A Data Breach with Robert Anderson, Jr
Top 10 Amazon Scams with Abigail Bishop
The Tinder Swindler with Ayleen Charlotte
Cyber Security Leadership is Broken with Rachel Briggs & Richard Brinson
Synthetic Fraud with Mike Cook
AI Fake News and Reviews with Peter Sisson
Protecting your Health Data with Katie Lips
How Cybercriminal Networks are Organized with Peter Taylor
Vehicle Hacking with Derrick
Global Scammer Impact with Jorij Abraham
Hacker to CISO with Alyssa Miller
How to Spot Fake Dating Profiles with Kathy Waters & Bryan Denny
The Danger of Errors on your Credit Report with Steve Baker
Security Planning with Consumer Reports with Amira Dhalla
10 Situational Vulnerabilities with Lou Baxter
Protect Your Social Security Number with Kevin Roundy
Keeping Children Safe Online with Titania Jordan
Protecting Your Identity with Patrick Glennon
Investigating Cybercrime with Anthony van der Meer
Pig Butchering with Jane Lee
4 Levels of Human Factor Security with Roy Zur
15 Ways to Prevent Financial Exploitation with Cameron Huddleston
Behind the scences of a scammer syndicate with Jack Whitaker
Payment App Scams with Michelle Couch-Friedman
Fighting Against Fraud with John Breyault
Tips to Avoid Insurance Fraud with William A. Royal
Cyberbullying with Dr. Robin Kowalski
Smishing is the new SPAM with Giulia Porter
Is AI Going to Take Over the World? with Daniel Hulme
How to Avoid Scammy Tech with Krazy Ken
Former FBI Agent Shares Cybercrime Trends with Erick O’Neill
The Impact of AI on Scamming with Ran Levi
Attack Techniques Scammers are Using with Joel Hollenbeck
Security Challenges and Risks with Rober Siciliano
The Constantly Evolving Subject of Cyber Security with Stephen Cobb
Corporate Spying with Robert Kerbeck
Risk Review Helps Discover Weakness with Ralph Russo
Forensic Accounting with Leah Wietholter
Top 5 Scams of Last Year with Melissa Trumpower
Minimizing Damage from Cyber Attacks with Stuart Madnick
Hackers Don’t Wear Hoodies with Lisa Pleggemeir
The Impact of Cyber Bullying with Tina Meier
Can You Protect Intellectual Property? with David Cooper
7 Ways to Reduce Anxiety with Dr. Michele Borba
Don’t Miss Opportunities Created by AI with Howard Getson
When Violence Is The Answer with Tim Larkin
Hostage Taking with Rachel Briggs
Online Security: Just Hope for the Best with Steve Gibson
Get Rich Quick Schemes vs. Investments with Justin Donald
Negotiating with Chris Voss
Identity Theft of Children with Kelli Grant
Utility Scams with Amy Livingston
Pet Scams with Jack Whitaker
Dating Scams – What Are the Warning Signs? with Joe Eweka
Business Ethics with Scott Stratten
Health & Wellness Scams with Natalia Petrzela
How to Travel Safely with Asher Fergusson
Call Center Scams with Ben Taylor
How Secure is “In The Cloud”? with Dr Randall Magiera
Freelance Scams: Red Flags and Warning Signs with Ricardo Fayet
Basic but Effective Online Security Tips with Jordan Harbinger
Scams Targeting Website Owners with Liz Eisworth
The Risks of Online Gaming with Eric R Jones
Building a Scammer Free Professional Network with Ken Rutkowski
How to Donate Wisely and Avoid Charity Scams with Laurie Styron
Internet Defamation with Kenton Hutcherson
Womens Safety Tips with Jessa Russell
20 ways you are ruining your credit with Steve Snyder
7 ways you are being influenced with Robert Cialdini
Cybercrime investigations with Ken Gamble
Surveillance and School Safety with Jason Kelly
Gaslighting with Dr Deborah Vinall
Smart-Home Hack Protection with Amanda Fennell
AI, Blockchain and the IoT with Don Tapscott
Staying safe on-line with Adam Levin
Attention Thieves with David Kadavy
Social Engineering & pickpockets with Chris Kirsch
School Safety & Security with Jason Stoddard
Situational Awareness with Robert Montgomery
Exposing Weakness Before Its Exploited with Jayson E Street
National Child Protection Task Force with Kevin Metcalf
Crypto Wars with Erica Stanford
Perils of Enlightenment with Caroline Slaughter
Preparedness without Paranoia with Kathleen Kierna
Cryptocurrency Exit Scams with Aaron Lammer
Resilience and Security with Kris Coleman
Stalkerware with Eva Galperin
Influence and non-conscious persuasion with Roger Dooley
People Hacking with Jenny Radcliff
Sales Influence with Ross Jefferies
Child Exploitation with Dr. Deaneé Johnson
Amazon Scams with Shaahin Cheyene
Deep Fakes with OneDuality
Data Destruction with Paul Katzoff
Hacking with Alissa Knight
How to spot a liar with Pamela Meyer
Influencer Marketing with Neal Schaffer
Puppy Scams with Brandi Hunter
Deception Detection with Abby Ellin
Ethical Hacking with Brian Self
Cyber Security for Seniors with Scott Schober
Ponzi Schemes – Charles Ponzi’s Birthday with Steve Weisman
Psychopaths and Self-Protection with Mike Mandel
Privacy by Design with Nishant Bhajaria
Catfishing with David McClellan
Surviving a Romance Scam with Debby Johnson
Keeping Kids Safe Online with Susan McLean
Student Loan Scams with Robert Farrington
Women in Security with Eleanor Dallaway
Avoiding Mentorship Disasters with Mark Timm
Protecting your Business with Mary C Kelly
Protect Yourself – Real Life Scenarios with James Casey
Fraud Busting with Traci Brown
Scam Baiting with Jim Browning
Penetration Testing and Ethical Hacking with Ed Skoudis
Charity Scams with Michael Thatcher & Zachary Weinsteiger
Psychological Security with Adam Anderson
The Life of a Cybercriminal with Brett Johnson
Embezzlement with Kelly Paxton
Surveillance and Digital Rights with Danny Obrien
Personal Finance Scams with Dori Zinn
You Can Stop Stupid with Ira Winkler
Disinformation, Misinformation, Interference, and Influence with Morgan Wright
Dating Scams with Kezia Noble
Social Engineering with Jack Rhysider
Reputation Management with Chris Silver Smith
Conspiracy Theories with Michael Shermer
Managing Credit Cards with Sara Rathner
The Unexpected Cost of Privacy with John McAfee
Cyber Security in the News with Graham Cluley
Privacy and Security with Rebecca Herold
Stalkerware with John Bambenek
SIM Swapping with Haseeb Awan
Narcissists, Psychopaths, and Sociopaths with Ramani Durvasula
Credit Card Skimming with Scott Schober
Tracking Scammers with Wayne May
Red Collar Crime with Rich Brody
Cyber Security Awareness with Jake Moore
Physchology of Scams with Dr Stacey Wood
Hacking with James Kettle
Multilevel Marketing with Casey Bond
Wordplace Bullying with Tim Dimoff
Trust and Encryption with Casey Crane
Ransomware with Joel Witts and Craig MacAlpine
Identity Theft with Dana Mantilia
Website Attacks with Cloudflare
Catfishing, Cybersecurity, and Cons, oh my! with Tyler Cohen Wood
Remote Worker Cybersecurity Risks with Eric Cole
Hoaxes with Alex H. Kasprak
Short Term Rental Scams with J Massey
Business Email Compromise (BEC) Scams with Steve Weisman
Data Breaches with Troy Hunt
Likeness Scams with Jeffrey Hayzlett

Get Notified When We Release New EpisodesALERT ME

Get Notified

When we release
new episodes

We will only send you awesome stuff!

Privacy Policy

×

 
×

Easy Prey Self Assessment Cover

Are you safe or at risk? Find out.

We’ll send you instructions to download the self-assessment right away. It takes only a few minutes to complete.

We hate spam and promise not to spam you.
Unsubscribe at any time.

Privacy Policy

×

Hire Me To Speak

Privacy Policy

×

Privacy Policy

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on every page of our site.

The Way We Use Information

We use email addresses to confirm registration upon the creation of a new account.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

On occasion, we may send email to addresses of registered users to inform them about changes or new features added to our site.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Affiliated sites, linked sites, and advertisements

CGP Holdings, Inc. expects its partners, advertisers, and third-party affiliates to respect the privacy of our users. However, third parties, including our partners, advertisers, affiliates and other content providers accessible through our site, may have their own privacy and data collection policies and practices. For example, during your visit to our site you may link to, or view as part of a frame on a CGP Holdings, Inc. page, certain content that is actually created or hosted by a third party. Also, through CGP Holdings, Inc. you may be introduced to, or be able to access, information, Web sites, advertisements, features, contests or sweepstakes offered by other parties. CGP Holdings, Inc. is not responsible for the actions or policies of such third parties. You should check the applicable privacy policies of those third parties when providing information on a feature or page operated by a third party.

While on our site, our advertisers, promotional partners or other third parties may use cookies or other technology to attempt to identify some of your preferences or retrieve information about you. For example, some of our advertising is served by third parties and may include cookies that enable the advertiser to determine whether you have seen a particular advertisement before. Through features available on our site, third parties may use cookies or other technology to gather information. CGP Holdings, Inc. does not control the use of this technology or the resulting information and is not responsible for any actions or policies of such third parties.

We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. For information about their specific privacy policies please contact the advertisers directly.

Please be careful and responsible whenever you are online. Should you choose to voluntarily disclose Personally Identifiable Information on our site, such as in message boards, chat areas or in advertising or notices you post, that information can be viewed publicly and can be collected and used by third parties without our knowledge and may result in unsolicited messages from other individuals or third parties. Such activities are beyond the control of CGP Holdings, Inc. and this policy.

Changes to this policy

CGP Holdings, Inc. reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of our site following the posting of changes to these terms will mean you accept those changes. Information collected prior to the time any change is posted will be used according to the rules and laws that applied at the time the information was collected.

 

×