
Sign up to save your podcasts
Or


AI search tools are being used by criminals to sort through data breaches and data dumps they've stolen to target as many individuals as possible. After your phone has been swapped, they'll have the ability to access all your SMS messages and phone calls. But there are precautions you can take.
Today's guest is Mark Kreitzman. Mark is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:
By Chris Parker4.7
3030 ratings
AI search tools are being used by criminals to sort through data breaches and data dumps they've stolen to target as many individuals as possible. After your phone has been swapped, they'll have the ability to access all your SMS messages and phone calls. But there are precautions you can take.
Today's guest is Mark Kreitzman. Mark is a seasoned cybersecurity expert with over 20 years of experience in building cybersecurity companies. Mark brings insights into evolving threats facing mobile security and data privacy. His expertise in our increasingly mobile world makes him a valuable resource in discussing how to mitigate your risks as it pertains to mobile communications.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:
37,514 Listeners

21,187 Listeners

11,783 Listeners

10,756 Listeners

131 Listeners

8,052 Listeners

1,087 Listeners

1,908 Listeners

47,350 Listeners

349 Listeners

4,698 Listeners

2,141 Listeners

7,982 Listeners

19,668 Listeners

1 Listeners