Easy Prey

Mobile Device Threats


Listen Later

In a world where we're told to carry our entire lives in our pockets, we've reached a strange tipping point where the very devices meant to connect us have become windows into our private lives for those who wish us harm. It's no longer a matter of looking for the "shady" corners of the internet; today, the threats come from nation-state actors, advanced AI, and even the people we think we're hiring. We are living in an era where the most sophisticated hackers aren't just trying to break into your phone, they're trying to move into your business by pretending to be your best employee.

Joining the conversation today is Jared Shepard, an innovative industry leader and the CEO of Hypori. A U.S. Army veteran with over 20 years of experience, Jared's journey is far from typical; he went from being a high school dropout to serving as a sniper and eventually becoming the lead technical planner for the Army's Third Corps. He is also the founder of Intelligent Waves and the chair of the nonprofit Warriors Ethos, bringing a perspective shaped by years of advising technologists in active war zones.

We're going to dive deep into why Jared believes everything you own should be considered already compromised and why that realization is the first step toward true security. From the terrifying reality of his own 401k being stolen via identity theft to the future of "dumb terminals" that protect your privacy by storing nothing at all, this discussion challenges the status quo. We'll explore how to navigate a future where AI can fake your identity in real-time and why the ultimate battle in cybersecurity isn't against a specific country, but against our own human tendency toward laziness.

Show Notes:
  • [[02:12] Jared Shepard of Hypori is here to discuss how modern cyber threats actually play out in real life.
  • [04:48] How modern attacks unfold slowly instead of triggering obvious alarms.
  • [05:55] Why many victims don't realize anything is wrong until secondary systems start failing.
  • [07:56] What identity theft looks like when accounts are targeted methodically over time.
  • [08:48] How attackers prioritize persistence and access over immediate financial gain.
  • [10:32] A real attempt to take over long-term financial accounts and how it surfaced.
  • [13:07] Why financial institutions often respond late even when fraud is already underway.
  • [15:44] The limits of traditional identity verification in an AI-driven threat environment.
  • [16:52] Why layered authentication still fails when underlying identity data is compromised.
  • [18:21] Deepfakes, voice cloning, and why video calls no longer prove much.
  • [20:57] How laptop farms are used to bypass hiring controls and internal access checks.
  • [22:18] Why insider-style access is increasingly coming from outside the organization.
  • [23:33] Why some companies are quietly bringing back in-person steps for sensitive roles.
  • [26:09] SIM farms, mobile identity abuse, and how scale changes detection.
  • [28:47] The growing tension between personal privacy and corporate device control.
  • [31:22] Why assuming device compromise changes everything downstream.
  • [33:58] Isolating data from endpoints instead of trying to secure the device itself.
  • [35:12] How moving compute and data off the endpoint reduces exposure without requiring device monitoring.
  • [36:35] How pixel-only access limits data exposure even on compromised hardware.
  • [39:11] Why AI training data introduces new security and poisoning risks.
  • [41:46] Why recovery planning is often overlooked until it's too late.
  • [44:18] The problem with victim-blaming and how it distorts security responses.
  • [46:52] Why layered defenses matter more than any single tool or platform.
  • [47:58] What practical preparation looks like for individuals, not just enterprises.
  • [49:12] Rethinking privacy as controlled access rather than total lock-down.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Jared Shepard - Hypori
  • Jared Shepard - LinkedIn
  • Warriors Ethos - Jared Shepard
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

30 ratings


More shows like Easy Prey

View all
Criminal by Vox Media Podcast Network

Criminal

37,521 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,159 Listeners

20/20 by ABC News

20/20

11,909 Listeners

48 Hours by CBS News

48 Hours

10,919 Listeners

Health Report by ABC

Health Report

128 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,073 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,075 Listeners

What Was That Like - True Stories. Real People. by Scott Johnson & Glassbox Media.

What Was That Like - True Stories. Real People.

1,922 Listeners

Dateline NBC by NBC News

Dateline NBC

47,707 Listeners

WHEN DATING HURTS by Evergreen Podcasts

WHEN DATING HURTS

345 Listeners

Killer Psyche by Wondery | Treefort Media

Killer Psyche

4,667 Listeners

Body Bags with Joseph Scott Morgan by CrimeOnline and iHeartPodcasts

Body Bags with Joseph Scott Morgan

2,164 Listeners

Betrayal: Weekly by iHeartPodcasts and Glass Podcasts

Betrayal: Weekly

8,018 Listeners

The Mel Robbins Podcast by Mel Robbins

The Mel Robbins Podcast

20,826 Listeners

If I Can Be SCAMMED, So Could YOU! by MsRomanceScam

If I Can Be SCAMMED, So Could YOU!

0 Listeners