
Sign up to save your podcasts
Or
AI search tools are being used by criminals to sort through data breaches and data dumps they’ve stolen to target as many individuals as possible. After your phone has been swapped, they’ll have the ability to access all your SMS messages and phone calls. But there are precautions you can take.
Today’s guest is Mark Kreitzman. Mark is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:4.6
2828 ratings
AI search tools are being used by criminals to sort through data breaches and data dumps they’ve stolen to target as many individuals as possible. After your phone has been swapped, they’ll have the ability to access all your SMS messages and phone calls. But there are precautions you can take.
Today’s guest is Mark Kreitzman. Mark is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:760 Listeners
78,301 Listeners
10,464 Listeners
37,476 Listeners
8,002 Listeners
9,823 Listeners
12,011 Listeners
1,087 Listeners
315 Listeners
284 Listeners
13,828 Listeners
7,204 Listeners
1,130 Listeners
291 Listeners
429 Listeners