Axton Betz-Hamilton

Axton Gets the Shock of a Lifetime (Part 2)

When the culprit is a family member, the trauma runs deep.
Axton Betz-Hamilton

Axton Goes Looking For Her Identity Thief (Part 1)

Child identity theft is a lot more common than you might think, it’s usually an inside job, and it’s always completely messed up.
What the Hack with Adam Levin

Paul Raffile Fights Sextortion No Matter What

An expert on financial sextortion loses a job offer to protect people from it when he shares his expertise on the topic.
What the Hack with Adam Levin

Beth Should Have Dated the IT Guy

Beth Hyland went on Tinder to find true love, but instead she found a very real (and shockingly expensive) nightmare.
What the Hack with Adam Levin

Elizabeth Warren Tackles Big Tech

Senator Elizabeth Warren is a lightning rod for all things that impact consumers, and she’s taking on Big Tech.
Becky Holmes

Becky Holmes Knows Who *Isn’t* Dating Keanu Reeves

Hilarious writer and Twitter-zen Becky Holmes has made a name for herself exposing romance scammers.

Carina Follows Her Heart Into a Crypto Scam

What seemed like a budding romance ends in emotional and financial devastation.
Tarah Wheeler

Tarah Wheeler Narrowly Avoids Getting Got

A Swiss cheese analogy helps keep a cyber pro from falling prey to a payroll scam.
Seven Digital Sins

The Seven Digital Sins

It’s no secret the internet doesn’t always bring out the best in people. The relative anonymity and global sprawl of digital life make it...
Blind Mule Scam

Blind Mule Scams: What You Need to Know

Scammers groom unwitting targets and then trick them into trafficking illicit drugs and other contraband.
Secret Service Agent “Mark” Works the Pan-Africa Beat

Secret Service Agent “Mark” Works the Pan-Africa Beat

“Mark” tracks criminals in more than 20 African nations, and blew our minds in this conversation about how the crime rings there work.
Cybersecurity girl Caitlin Sarian

Cybersecurity Girl Caitlin Sarian Tries to Delete Herself Online

Privacy may be dead but if a cybersecurity social media star has anything to do with it’s going to become a martyr.
ASCII Art

Can Art Be Used to Beat AI Security?

A decades-old type of computer art can be used to circumvent AI security features.
presley rhodes

Presley Rhodes Fights an Army of Thirst Trap Thieves

OnlyFans, impersonation, cyberstalking, identity theft and sextortion collide in this week’s episode
Dark Rhiino

Adam Levin featured on Dark Rhiino’s Security Confidential Podcast

Adam Levin was a guest on Dark Rhiino's Security Confidental podcast. In the episode, he encouraged listeners to protect both their security and their...
SNAP EBT fraud

Joy and Michelle Talk Skimmers, Scammers and SNAP EBT Fraud

SNAP EBT scams sap twenty percent of the funds earmarked for food assistance. This week’s guests tell us how to tackle the problem.
Brett Johnson

Brett Johnson Explains the Abject Terror that Awaits Us All

The Godfather of Internet crime wants you to know that he’s sorry for his crimes, but he doesn’t mind taking a stroll down Memory Lane.
Christina LaBarbiera

Christina’s Alleged Romance Scammer Plays A Long Con

Sometimes the most convincing online dating scams happen in person.
Eva Galperin

EFF’s Eva Galperin Is Not the Pope of Fighting Stalkerware (But...

Is using stalkerware to spy on someone ever okay? Eva Galperin doesn’t think so.
Scams targeting small businesses

3 Scams Targeting Small Businesses

Small businesses are often easy targets for scammers. Here’s how.