Carrie Kerskie 公开
[search 0]
更多
Download the App!
show episodes
 
Loading …
show series
 
Ever noticed how you stay on an app even though you clicked on a link to a different website? This convenient trick is more harmful than you'd think. This week, Carrie talks about the hidden threat that in-app browser's pose to your privacy. In this episode you'll learn: What exactly are in-app browsers? What information are they collecting? How mu…
  continue reading
 
Even though we rely on email for nearly everything we do online, we seem to forget about all the information connected to it. Not to mention all the entities that have access to collect and view this info as well. In this episode, Carrie gets to talk with Brad Deflin of Total Digital Security as they over all of the dangers of using a free email se…
  continue reading
 
Remember when scams used to look like scams? Back when you used to be able to find out if something was real or not based on a handful of things you could check. Those were the good ole days. This week, Carrie talks about a new cyber-attack that’s as realistic as it gets when it comes to a scam. Criminals are now setting up official PayPal accounts…
  continue reading
 
Within the past months there’s been a growing concern over the threat known as hermit spyware. Breaking news titles warn of the damage and financial havoc caused by this new type of cyberattack, causing people to go into a panic with the fear that they may become the next victim. But what exactly is this “hermit spyware”? Are you at risk of being a…
  continue reading
 
In this Fourth of July episode, Carrie talks about the dangers of relying on banks, credit companies, and other financial institutions. She stresses the importance of knowing what’s going on in your accounts, and how waiting for your bank to notify you of fraudulent transactions can cost you big time. Things you’ll learn in this week’s episode: Why…
  continue reading
 
Technology has made many aspects of our life a lot easier, but it's also come with its fair share of downsides, some of which you may not be aware of. The convenience that comes in this digital age comes at a price, the cost being your information. In this episode, Carrie goes over the argument of Privacy vs. Convenience. Things you’ll learn in thi…
  continue reading
 
A new change makes it easier to access your Experian freeze, listen to find out as Carrie explains this new feature to manage your account online. Resources: Link to Experian https://www.experian.com/freeze/center.html Privacy-Mentor Website https://privacy-mentor.com Link to Protect Your Identity in 14 Days https://kerskie.podia.com/protect_your_i…
  continue reading
 
Want to find out how much your smart devices know about you? Well now you can… This week, Carrie interviews the creator and lead of Mozilla’s Privacy Not Included Guide, Jen Caltrider. This guide reviews things like smart speakers, toys, games, wearables, and other devices that are connected to the internet. However, some of these items come with a…
  continue reading
 
2FA was created to protect your online accounts against cyber criminals. In this episode Carrie shares with you a new scam that uses 2FA codes to gain access to your financial accounts. What you’ll learn: What is 2FA or MFA How this scam works Two tools to avoid becoming a victim Want more great tips? Join the Privacy-Mentor email list. No span, ju…
  continue reading
 
Email plays a big part of communicating in this digital age, but did you know that many of the free email services are scraping your emails to collect information? That’s right. The reason so many of these email services are free, is due to the fact that they are profiting off of data collected via emails you send and receive. This data is then use…
  continue reading
 
By now you’ve probably heard of some form of credit protection service, whether it be a freeze, a lock, or a fraud alert; however, you’d be surprised to know the differences between these services, and how one form may protect you more than another. In this episode, Carrie and Kyle discuss these three forms of credit protections, what they really d…
  continue reading
 
Remote access software is a topic we’ve brought up several times in previous podcast and blog post, and in this episode Carrie and Kyle go over exactly what it is, and how bad guys are using it to their advantage. In this episode you’ll learn: What is remote access software? What are some common example of it? How are criminals using it? How to det…
  continue reading
 
Here’s a brief overview of what you learn in this episode: Why StartPage was created What makes StartPage different from other search engines What is a search bubble? Typically, if a product is free, you are the product. How does StartPage generate revenue? How to get started with StartPage?由Carrie Kerskie
  continue reading
 
Following up last week’s episode about 1099 fraud and staying on the topic of tax scams this season, Carrie interviews Ron Loecker, Special Agent in Charge of IRS Criminal Investigations. Ron answers some of Carrie's questions and gives some tips to help you avoid any problems this tax year. Things you’ll learn in this episode: What to look for whe…
  continue reading
 
This week, Carrie talks about another popular issue we see this time of year around tax season. In this situation, a woman received a 1099 form regarding taxable miscellaneous income she’s made off an investment account; The problem is, she’s never opened or had any such account. Find out why criminals are taking advantage of investing platforms, a…
  continue reading
 
Recently, Carrie received a call from someone worried that their mobile phone number was hacked. Out of fear, and some bad advice, they made some drastic changes on their own to protect their information. What they did not only gave the bad guys more control but locked the victim out of being able to access their own accounts. Listen to find out ho…
  continue reading
 
Love is in the air in this episode, as Carrie talks about the notorious sweetheart scammers. This Valentine’s Day inspired topic covers a type of criminal that takes advantage of individuals in search of relationships online; but it’s not just those looking for love that are at risk. Carrie will share with you how non-romantic relationships found o…
  continue reading
 
Recently, when replying to a client’s email, we received an email undeliverable response saying that their mailbox was full. However, upon closer review, the email address mentioned didn’t belong to my client. We called the client to see if he received my reply. He said “yes.” We then asked him if he was familiar with the email address listed on th…
  continue reading
 
After listening to last week’s podcast, Carrie’s interview with Kris Coleman (Red5Security) about how to minimize your online exposure, Kyle was curious about his own online exposure. In this episode Kyle shares with you what he found, and the difficulty of removing the information. Things you’ll learn in this episode: How personal data can be foun…
  continue reading
 
Carrie is joined by Red5Security CEO Kris Coleman this week as they go over how easy it is for someone to find your personal information online. They discuss topics such as how this information gets out there, and who’s collecting it. They also talk about if you can remove what’s already out there, and things you can do to limit how much data is co…
  continue reading
 
In this episode, Carrie discusses a case she’s worked on involving a private family foundation. A seemingly innocent call responding to a fake job offer posted online turns into a full blown criminal operation impacting job seekers and foundations alike. Things you’ll learn in this episode: The importance of registering your foundation or company’s…
  continue reading
 
Ever recieved some well intended advice that turned out to do more harm then good? In this episode Carrie talks about some things aren't always as they seem. She goes over how harmful remote access software can hide on your device, and explains how it got there in the first place. Things you'll learn in this episode: Why remote access software isn'…
  continue reading
 
Taking down an international criminal ring isn’t easy. They often rely on sophisticated technology to thwart investigators. That same technology was used to take down hundreds of thousands of criminals. In this episode I speak with Tom Whalen, a former Special Agent with the FBI. For the first time, he is discussing Operation Trojan Shield and how …
  continue reading
 
In this episode Carrie and Kyle go over the true value of your location tracking data. Carrie talks about the high price it’s worth and why it’s in such a high demand. They also go over the importance of choosing the correct settings and only allowing certain apps to have access to this information. Things you’ll learn in this episode: How much our…
  continue reading
 
In this episode Carrie and Kyle go over the top worst passwords of 2021. They talk about the general rules to follow when creating a password, and what mistakes to avoid. Carrie also mentions how often you need to change your password, and what do to if your password was involved in a data breach. They also bring up a previous podcast episode where…
  continue reading
 
In this episode, Carrie shares a story about a woman who found out just how much the smart devices in her house were listening to. Carrie cautions the idea of using these devices for privacy reasons and explains why she doesn’t own one herself. She also goes over why some smart devices are becoming more common and less expensive than normal product…
  continue reading
 
In this episode Carrie warns about receiving letters for bank accounts that you didn’t open. She emphasizes the importance of not ignoring these letters and talks about the repercussions of what could happen if you do. Carrie also explains what to do if you realize that your identity is being used to launder money within a fraudulent bank account a…
  continue reading
 
In this episode Carrie and Kyle talk about the different types of security methods on your Apple device. Carrie answers Kyle’s question about which methods are “safer” to use, as well as explaining their potential weaknesses. She also shares stories of why the biometrical side of security isn’t always the most reliable. In this episode you will lea…
  continue reading
 
In this episode Carrie answers some of Kyle’s question about what exactly an anti-virus- what it can and cannot do. Carrie also mentions how an office’s systems were compromised due to the installation of a fake anti-virus and provides the name of a website to help you select the best anti-virus program for your devices. In this episode you will le…
  continue reading
 
In this episode Carrie and Kyle bring up scam text messages that they’ve being seeing recently. They discuss the different types they’ve received as well as the reasoning behind why they are being sent out. Carrie also shares tips to protect yourself from these messages and mentions ways to report these scam numbers. In this episode you will learn:…
  continue reading
 
In this episode of privacy mentor, Carrie talks about a couple that fell for an elaborate pop-up scam that resulted in them losing nearly half a million dollars. She goes in depth about how convincing these criminals can be, by telling the story from the victim’s perspective, then explaining what they could have done to protect themselves. Things y…
  continue reading
 
Phone carriers are working to minimize scam and robocalls from reaching you. But, what about the calls that make it through? If only there was a tool that would tell you if a call is a scam. There is - Elefend.com. In this episode I speak with Omri Gattegno, CEO/Co-Founder, of Elefend.com. Resources mentioned: Elefend.com/offer join for only $2.99 …
  continue reading
 
Phone scams are becoming more sophisticated resulting in more people losing hundreds or thousands of dollars. How can you protect yourself from being manipulated by a scammer? Listen to this episode to find out. Things you will learn in this episode: Why phone scams? Why are they so successful How do they work? How to protect yourself What to do if…
  continue reading
 
Scammers, hackers, and other types of bad guys often demand their victims pay with a gift card, but why? In this episode take a deep dive into gift cards and what makes them so attractive to scammers. Things you will learn in this episode: Why gift cards over other forms of payment The benefits of using gift cards How bad guys use them after the sc…
  continue reading
 
Does receiving a notice your information was exposed in a breach cause panic? Should it? Maybe not. Find out in this episode. Plus, learn steps to take after your information was exposed in a breach. Resources: Episode 30 Public Records https://carriekerskie.libsyn.com/how-public-records-put-you-at-risk Episode 33 Facebook Contest and Polls http://…
  continue reading
 
In this episode, Carrie interviews TK Kitts, President and Chief Investigator of private intelligence firm Redbeard Intelligence & Investigations. TK is involved in undercover investigations and needs to protect his identity. He’ll share how he uses AI technology to alter his true identity. Watch it live as it happens. Will he impersonate Carrie du…
  continue reading
 
Don't get tricked into becoming a money mule. Learn what a money mule is, how bad guys can trick you into becoming one, and steps to take if you think you or someone you know might be a money mule. Interview with TK Kitts, Redbeard Intelligence & Investigations Where to report money mules/suspicious activity: Publicly: FBI’s Internet Crime Complain…
  continue reading
 
Going to Experian.com to activate your credit freeze could result in paying unnecessary fees or getting you something other than a credit freeze. In this episode you'll find out the RIGHT way to activate a credit freeze. Resources: https://www.experian.com/freeze/center.html How to Freeze Your Credit video Protect Your Identity in 14-days online pr…
  continue reading
 
In this episode we explore an money making phone scam voicemail message that I received. While some might say it’s not a true scam, it definitely is in the gray area. The call was regarding an opportunity to make “$10,000 per month.” The scam is that some people hear these and pay the fee to attend the webinar or training only to discover they wast…
  continue reading
 
When it comes to protecting your credit from identity theft you have three options available from the credit bureaus: Fraud alert Credit freeze Credit lock Do you know the difference between them? If not, this episode is for you. One provides the strongest protection and one could reduce your rights. Topics covered: What is a fraud alert What is a …
  continue reading
 
People complain how Facebook is an invasion of privacy. Then why are they the same ones participating in the polls, contests, and such? In this episode you’ll learn about the clever tools used to harvest details about your personality and how that information is used. Topics covered: The risk of participating in polls, contests, surveys, liking and…
  continue reading
 
A big change is coming to this podcast? What is it? Tune in to find out. Plus, there is a new vaccine phone scam making the rounds. Learn more about it so you are prepared when you get this scam call. I have a favor to ask, if you listen using Apple Podcast, please take a moment and leave me a review. I would be most grateful.…
  continue reading
 
Googling yourself is a great way to find out what information about you is available online. But, did you know there are other sources of information that often do not show up in an internet search? What are they? Public records, records posted to the public online by your local state and county. Join me to find out where to find these public recor…
  continue reading
 
Let’s face it, spam sucks. No one likes it, but everyone has it. I found a few tricks to minimize email spam and I’m sharing them with you in this episode. Topics: What is spam How do you get spam Three tricks to minimize spam Read the full blog post https://carriekerskie.com/free-your-inbox-from-spam-by-doing-this/ Like what you hear? Leave me a r…
  continue reading
 
Loading …

快速参考指南