
Sign up to save your podcasts
Or
AI search tools are being used by criminals to sort through data breaches and data dumps they’ve stolen to target as many individuals as possible. After your phone has been swapped, they’ll have the ability to access all your SMS messages and phone calls. But there are precautions you can take.
Today’s guest is Mark Kreitzman. Mark is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:4.6
2727 ratings
AI search tools are being used by criminals to sort through data breaches and data dumps they’ve stolen to target as many individuals as possible. After your phone has been swapped, they’ll have the ability to access all your SMS messages and phone calls. But there are precautions you can take.
Today’s guest is Mark Kreitzman. Mark is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:14,144 Listeners
174 Listeners
923 Listeners
7,822 Listeners
11,934 Listeners
1,080 Listeners
304 Listeners
230 Listeners
13,730 Listeners
1,098 Listeners
28,212 Listeners
209 Listeners
1,707 Listeners
150 Listeners
959 Listeners