Easy Prey

Easy Prey

Host: Chris Parker

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

Episodes

Privacy is Dead
01August 20, 2025 5:00am

Privacy is Dead

Privacy in the digital age has grown from a background concern into one of the defining issues of our time. What began with simple questions about online safety has expanded into a complex, global conversation about how artificial intellige…

America’s Scam Crisis
02August 13, 2025 5:00am

America’s Scam Crisis

Most of us think of scams as random or isolated or something that just happens to unlucky people. But what if the truth is far more organized, far more disturbing? Behind many of today’s scams is a global web of criminal enterprises, struct…

How Fraudsters Choose Targets
03August 06, 2025 5:00am

How Fraudsters Choose Targets

It’s easy to think of fraud prevention as a technical problem with a software solution. But according to Brian Davis, effective fraud defense is just as much about people, trust, and communication as it is about tools and data. With over a …

Hidden Dangers of AI in Cybersecurity
04July 30, 2025 5:00am

Hidden Dangers of AI in Cybersecurity

Everyone’s talking about AI these days, especially in cybersecurity. Sure, artificial intelligence can boost your defenses, but cybercriminals have noticed too. Now they're crafting phishing emails so believable it’s scary and finding cleve…

Author Scams Exposed
05July 23, 2025 5:00am

Author Scams Exposed

Writers pour their hearts into their work, but unfortunately, that passion can make them prime targets for scams. From fake agents and vanity publishers to slick marketing schemes and social media impersonators, the tactics have only gotten…

Tricked by Followers and Badges
06July 16, 2025 5:00am

Tricked by Followers and Badges

What if your social media success was built on deception, and it was working? In today’s episode, we hear from someone who knows exactly how that happens. Tim O’Hearn is a former software engineer and the author of Framed: A Villain’s Persp…

Only 10 Seconds to Expose a Scam
07July 09, 2025 5:00am

Only 10 Seconds to Expose a Scam

What if you could stop a scam in real-time before the damage is done? In this episode, I’m joined by Nick Stapleton, an investigative journalist and the face behind Scam Interceptors, the BAFTA award-winning BBC series that exposes online f…

Gambling, Lies, and Millions Stolen from Celebrities
08July 02, 2025 5:00am

Gambling, Lies, and Millions Stolen from Celebrities

What happens when the drive to succeed masks deep emotional wounds and addiction? In this episode, Jonathan Schwartz shares a powerful and painfully honest account of how his life unraveled.  Once one of Hollywood’s most trusted financial a…

Human Side of Fraud: Empathy, Education, & Evolution
09June 25, 2025 5:00am

Human Side of Fraud: Empathy, Education, & Evolution

People used to think fraud was something that happened in the shadows, rare, distant, and mostly affecting big companies. But after talking to PJ Rohall, it’s clear that fraud is evolving fast, and it’s showing up in places most of us don’t…

Identity Is The New Security Perimeter
10June 18, 2025 5:00am

Identity Is The New Security Perimeter

Sometimes it feels like every new technology we adopt comes with a new risk we didn’t see coming. From AI and data breaches to phishing scams and ransomware, it's clear we live in a time when cybersecurity isn’t just a tech issue, it’s a hu…

Your Car Is Spying On You What It’s Collecting and Who It’s Telling
11June 11, 2025 5:00am

Your Car Is Spying On You What It’s Collecting and Who It’s Telling

I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From w…

Why Everyone’s A Target
12June 04, 2025 5:00am

Why Everyone’s A Target

Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know …

Child Exploitation Cyber Investigations
13May 28, 2025 5:00am

Child Exploitation Cyber Investigations

Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics,…

Reclaiming the Internet
14May 21, 2025 5:00am

Reclaiming the Internet

We may not always understand the evolution of the internet and how tech monopolies exist, but having digital freedom fighters is vital to making conscious change. Today's guest is Cory Doctorow. Cory is a science fiction author, activist, a…

Security Gaps Hackers Exploit
15May 14, 2025 2:00pm

Security Gaps Hackers Exploit

Scammers aren’t just phishing your inbox anymore—they’re impersonating your voice, your face, and even your coworkers. Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to …

Cyber Warfare
16May 07, 2025 5:00am

Cyber Warfare

Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—…

DDoS Attacks
17April 30, 2025 5:00am

DDoS Attacks

Scammers are getting smarter, understanding the psychology behind social engineering and the challenges companies face every day can help keep networks secure. This episode will show how to anticipate these threats and secure networks again…

Safe AI Implementation
18April 23, 2025 5:00am

Safe AI Implementation

Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures. It is vital to educate users about how to explore the challenges and keep AI systems secure. Today’s guest is…

The Art of Espionage
19April 16, 2025 5:00am

The Art of Espionage

What makes someone betray their country? It’s rarely just about money. In this episode, you’ll hear from a retired CIA officer who spent 25 years recruiting foreign spies by tapping into something deeper than greed. Jim Lawler shares real s…

Understanding Ransomware and Defense Strategies
20April 09, 2025 5:00am

Understanding Ransomware and Defense Strategies

When it comes to cybersecurity, most people think about firewalls, passwords, and antivirus software. But what about the attackers themselves? Understanding how they operate is just as important as having the right defenses in place. That’s…

Privacy and Surveillance
21April 02, 2025 5:00am

Privacy and Surveillance

Ever had that creepy feeling someone's watching you online? Now imagine if that feeling was actually your reality, not just your browsing history being tracked, but cameras following your every move on the street, your conversations being m…

Navigating Data Brokering and Privacy
22March 26, 2025 5:00am

Navigating Data Brokering and Privacy

In a world where data is more important than ever, understanding how it is acquired, shared, and misused is critical. Data brokers work behind the scenes, amassing enormous amounts of personal information from online activity, loyalty progr…

Be Your Own Fraud Prevention Hero
23March 19, 2025 5:00am

Be Your Own Fraud Prevention Hero

Getting defrauded is common. It happens everywhere but it’s underreported because of embarrassment. If you’re a victim of fraud the sooner you report the more likely you are to get a better outcome. To learn more about fraud I’m pleased to …

Empowering the Vulnerable
24March 12, 2025 5:00am

Empowering the Vulnerable

In cybersecurity, we need to understand the mindset of hacking, which is not ethics. We also need to realize that even if we have cybersecurity experts get hacked, there is no reason to feel embarrassed or ashamed when it happens to us. In …

How Not to Money with Joel Larsgaard
25March 05, 2025 5:00am

How Not to Money with Joel Larsgaard

Managing money isn’t about numbers, it's about making informed decisions that shape your future. Whether you’re a seasoned saver or just starting out on your financial journey understanding the basics of personal finance can make all the di…

Brushing Scams with Venkat Margapuri
26February 26, 2025 5:00am

Brushing Scams with Venkat Margapuri

Scams come in many forms but receiving a freebie from a scammer doesn’t make sense. If something shows up at your door that you didn’t order, should you be worried? Brushing scams are becoming more common and while they may seem harmless at…

Ransomeware, Phishing and Fraud
27February 19, 2025 5:00am

Ransomeware, Phishing and Fraud

Cybersecurity isn't just a concern for large corporations. It's vital for businesses of all sizes. It's essential for companies to know how to protect sensitive data, restore from backups, and regularly test their systems with internal pen …

CISOs: The Ultimate Stress Test With Jill Knesek
28February 12, 2025 5:00am

CISOs: The Ultimate Stress Test With Jill Knesek

The CISO role is constantly changing. With all the shifts in cybersecurity, it's crucial to find ways to attract new talent to close the growing skills gap. CISOs now juggle complex systems managed at multiple levels and handle burnout amon…

AI, Automation, and the Future of Cybersecurity With Mike Lyborg
29February 05, 2025 5:00am

AI, Automation, and the Future of Cybersecurity With Mike Lyborg

With the increase in targeted cyber attacks, it's more important than ever for organizations to quickly identify and respond to threats. AI is helping security teams by acting as virtual analysts, handling much of the investigation work. Ho…

Cybersecurity Training from Boring to Engaging With Howard Goodman
30January 29, 2025 5:00am

Cybersecurity Training from Boring to Engaging With Howard Goodman

The landscape of cybersecurity training and collaboration is changing, interactive education sessions and cross team communication is key. Building a security culture and staying ahead of the modern threats has never been more important. To…

Next-Gen Account Security with Christiaan Brand
31January 22, 2025 5:00am

Next-Gen Account Security with Christiaan Brand

With phishing and password breaches on the rise, passkeys could offer a more secure, user-friendly solution that could reshape how we protect our online identities. Today's guest is Christiaan Brand. Christiaan is the co-founder of Entersek…

5 Key Cybersecurity Elements with Kelly Hood
32January 15, 2025 5:00am

5 Key Cybersecurity Elements with Kelly Hood

How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they're redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively a…

Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
33January 08, 2025 5:00am

Identity Crimes (Theft, Compromise & Misuse) with Mona Terry

When you search for customer service numbers online, you might come across a scammer’s number instead. It’s important to be cautious when sharing personal information, and to verify identities before responding to requests for sensitive dat…

Why Resolutions Fail with Dr. Leslie Becker-Phelps
34January 01, 2025 5:00am

Why Resolutions Fail with Dr. Leslie Becker-Phelps

We often put off changes and schedule them to start on January 1st. Many of these idealistic resolutions fail shortly after beginning, so it is important to be thoughtful when planning so that you can set yourself up for success. Today’s gu…

Erasing Your Digital Footprint with Jeff Jockisch
35December 18, 2024 5:00am

Erasing Your Digital Footprint with Jeff Jockisch

Data is continuously being collected and this information can lead to misleading conclusions about an individual. Without proper context, behavior can be misinterpreted. This underscores the need for data privacy laws and stronger protectio…

Executive Recruiter Scams with John Sidoti
36December 11, 2024 5:00am

Executive Recruiter Scams with John Sidoti

When a recruiter contacts you, it’s essential to do your homework, verify their sources, and trust your instincts. If something seems too good to be true, it probably is. While it can be frustrating to be this skeptical, being cautious can …

Human Hacking with Peter Warmka
37December 04, 2024 5:00am

Human Hacking with Peter Warmka

Today’s threat actors and social engineers leverage social media to observe individuals’ patterns and habits. They encounter you at a coffee shop or another familiar spot. They begin to establish trust, which makes you more susceptible to t…

Digital Deception: What Lies Ahead with Perry Carpenter
38November 27, 2024 5:00am

Digital Deception: What Lies Ahead with Perry Carpenter

Creating habits of healthy skepticism when receiving texts or emails can prevent you from clicking on phishing links. Everybody is vulnerable online, especially when distracted or in a hurry. But cultivating critical thinking and self-aware…

Rethinking Online Anonymity with Lance Cottrell
39November 20, 2024 5:00am

Rethinking Online Anonymity with Lance Cottrell

In a world of cybersecurity and online privacy, anonymity seems to be the key. VPNs are often promoted as the cure-all to our internet needs. Let’s talk about some of those misconceptions. Today’s guest is Lance Cottrell. Lance founded Anon…

AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca
40November 13, 2024 5:00am

AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca

Cybersecurity is more crucial than ever. It’s essential that we proactively safeguard our data and recognize that no one is immune to attacks. We are all vulnerable. As malicious actors continually enhance their tactics, we must stay one st…