March 31, 2026

How to gather information using Artificial Intelligence (AI)

How to gather information using Artificial Intelligence (AI)
iHeartRadio podcast player iconAmazon Music podcast player iconApple Podcasts podcast player iconPandora podcast player iconPodchaser podcast player iconAudible podcast player iconSpotify podcast player iconDeezer podcast player iconSpreaker podcast player iconPodcast Addict podcast player iconYoutube Music podcast player iconYouTube podcast player iconCastbox podcast player iconCastamatic podcast player iconCastro podcast player iconFountain podcast player iconGoodpods podcast player iconOvercast podcast player iconRSS Feed podcast player iconPocketCasts podcast player iconPodimo podcast player iconPodurama podcast player icon
iHeartRadio podcast player iconAmazon Music podcast player iconApple Podcasts podcast player iconPandora podcast player iconPodchaser podcast player iconAudible podcast player iconSpotify podcast player iconDeezer podcast player iconSpreaker podcast player iconPodcast Addict podcast player iconYoutube Music podcast player iconYouTube podcast player iconCastbox podcast player iconCastamatic podcast player iconCastro podcast player iconFountain podcast player iconGoodpods podcast player iconOvercast podcast player iconRSS Feed podcast player iconPocketCasts podcast player iconPodimo podcast player iconPodurama podcast player icon

Looking for a software subscription to help protect your devices and yourself? There are so many out there - antivirus, credit monitoring, VPN, and many more! Where do you even begin to do your research?

Tune in as we talk with David Hawkins about using AI to do your research. We will use a free version of AI to gather the information needed to conduct the research.

Let’s Talk About Scams is broadcast live Tuesdays at 8AM PT on K4HD Radio - Hollywood Talk Radio (www.k4hd.com) part of Talk 4 Radio (www.talk4radio.com) on the Talk 4 Media Network (www.talk4media.com). Let’s Talk About Scams TV Show is viewed on Talk 4 TV (www.talk4tv.com).

Let’s Talk About Scams Podcast is also available on Talk 4 Media (www.talk4media.com), Talk 4 Podcasting (www.talk4podcasting.com), iHeartRadio, Amazon Music, Pandora, Spotify, Audible, and over 100 other podcast outlets.

Disclaimer: The information contained in this podcast is intended for informational purposes only and is not a substitute for individual professional / legal advice. The podcast information was carefully compiled from vetted sources and references; however, R.O.S.E. Resources / Outreach to Safeguard the Elderly cannot guarantee that you will not fall victim to a scam.

Become a supporter of this podcast: https://www.spreaker.com/podcast/let-s-talk-about-scams--6483699/support.

This episode includes AI-generated content.

WEBVTT

1
00:00:00.960 --> 00:00:04.559
This program is designed to provide general information with regards

2
00:00:04.599 --> 00:00:07.559
to the subject matters covered. This information is given with

3
00:00:07.599 --> 00:00:11.960
the understanding that neither the hosts, guests, sponsors, or station

4
00:00:12.199 --> 00:00:17.399
are engaged in rendering any specific and personal medical, financial,

5
00:00:17.760 --> 00:00:22.679
legal counseling, professional service, or any advice. You should seek

6
00:00:22.719 --> 00:00:26.800
the services of confident professionals before applying or trying any

7
00:00:26.920 --> 00:00:32.719
suggested ideas. The information contained in this podcast is intended

8
00:00:32.759 --> 00:00:35.960
for informational purposes only and is not a substitute for

9
00:00:36.039 --> 00:00:40.359
individual professional legal advice. The podcast information was carefully compiled

10
00:00:40.399 --> 00:00:44.520
from vetted sources and references. However, Rose Resources outreach to

11
00:00:44.600 --> 00:00:47.560
safeguard the elderly cannot guarantee that you will not fall

12
00:00:47.679 --> 00:00:52.560
victim to a scam. Let's talk about scams. It's the

13
00:00:52.920 --> 00:00:56.520
must listen show for anyone who wants to protect themselves

14
00:00:56.600 --> 00:01:01.200
and their loved ones from scams. Every Tuesday am Pacific

15
00:01:01.280 --> 00:01:05.680
time on K four HD Radio, Joyce Petrowski, founder of Rose,

16
00:01:05.840 --> 00:01:10.680
and her guests will provide valuable insights and practical tips

17
00:01:10.719 --> 00:01:15.040
on how to recognize and protect yourself from scams. And

18
00:01:15.120 --> 00:01:18.560
now here is your host, Joyce Petrowski.

19
00:01:19.439 --> 00:01:22.439
Hi, everyone, welcome back. I'm Joyce Petrowski, founder and board

20
00:01:22.480 --> 00:01:26.359
president of Rose Resources Outreach to safeguard the elderly. You

21
00:01:26.400 --> 00:01:30.040
can find more information on our website at Roseadvocacy dot org.

22
00:01:30.400 --> 00:01:33.040
All of our social media links are listed at the top.

23
00:01:33.400 --> 00:01:35.560
You can go down in to the bottom of the

24
00:01:35.560 --> 00:01:39.640
homepage and find how to sign up for our emailed

25
00:01:39.879 --> 00:01:44.319
newsletter and also our mailed newsletter. We send the mailed

26
00:01:44.319 --> 00:01:47.519
newsletter out at the beginning of every month. The one

27
00:01:47.519 --> 00:01:50.159
for April should be going out in the next couple days,

28
00:01:50.719 --> 00:01:55.280
and the emailed one goes out or in the usually

29
00:01:55.280 --> 00:01:57.879
in this now it's been the second week of the month,

30
00:01:57.920 --> 00:01:59.200
but I'm going to try and get it back to

31
00:01:59.200 --> 00:02:02.439
be the beginning of the month here soon. But every

32
00:02:02.439 --> 00:02:05.680
Tuesday morning at nine point fifteen Arizona time, you're going

33
00:02:05.719 --> 00:02:08.960
to get a Tuesday Tip. And you might start getting

34
00:02:08.960 --> 00:02:11.240
them and say, well, I already know these, But what

35
00:02:11.360 --> 00:02:16.000
it's doing just as important as the information in the

36
00:02:16.039 --> 00:02:19.599
Tuesday tip. What it's doing is is it helping make

37
00:02:19.719 --> 00:02:25.439
your scam prevention a habit, in your healthy skepticism a habit.

38
00:02:28.039 --> 00:02:31.159
So it's just a refresher, so it helps you the

39
00:02:31.199 --> 00:02:35.000
next time you are contacted be able to not panic,

40
00:02:35.159 --> 00:02:38.080
not get into an emotional state, but just stop and think, Okay,

41
00:02:38.120 --> 00:02:40.479
this could be a scam. What do I need to

42
00:02:40.599 --> 00:02:44.319
do to determine if it is a scam or it's legitimate.

43
00:02:44.560 --> 00:02:46.599
You can also go over to the right hand side

44
00:02:46.639 --> 00:02:49.879
at the top under Schedule your Presentation. You can learn

45
00:02:49.960 --> 00:02:53.400
more about all the different presentations we have available and

46
00:02:53.639 --> 00:02:56.960
fill out a form to send it to us with

47
00:02:57.000 --> 00:03:04.120
the information on scheduling your presentation. So today we were

48
00:03:04.439 --> 00:03:10.599
originally going to talk about how to search for different

49
00:03:10.680 --> 00:03:16.199
types of softwares using AI, and our guest David, had

50
00:03:16.199 --> 00:03:19.120
an emergency so he couldn't make it, so we did

51
00:03:19.120 --> 00:03:22.120
a little pivot for today, and I'm going to talk

52
00:03:22.120 --> 00:03:26.639
about some updates to that we've had on social media

53
00:03:26.840 --> 00:03:30.680
the last probably a couple weeks, and then also some

54
00:03:31.000 --> 00:03:35.120
FBI public service announcements that they've had out this month

55
00:03:35.360 --> 00:03:40.479
on some different scams. So let me share my screen here,

56
00:03:42.800 --> 00:03:45.159
all right, So I'm going to go to Facebook first,

57
00:03:46.240 --> 00:03:49.360
And first of all, when you get on our Facebook,

58
00:03:49.400 --> 00:03:53.560
this is what it looks like, and you can see

59
00:03:53.599 --> 00:03:57.280
up here in the search for our Facebook, dot com,

60
00:03:57.319 --> 00:04:01.719
slash rows, dot resources, dot outreach. That's the page, and

61
00:04:01.759 --> 00:04:06.240
then you can come down here and see some different posts.

62
00:04:06.280 --> 00:04:08.439
We have a golf tournament coming up, so we're thinking

63
00:04:08.960 --> 00:04:11.120
all of our sponsors. But here's one that we just

64
00:04:11.159 --> 00:04:18.160
put out yesterday. It's called push bombing. And so I'm

65
00:04:18.199 --> 00:04:22.839
sure everybody's heard of multi factor authentication or two factor authentication,

66
00:04:23.079 --> 00:04:28.079
but this is where it's also called multi factor authentification fatigue.

67
00:04:28.519 --> 00:04:32.319
Where let's say you get your codes texted to you.

68
00:04:32.319 --> 00:04:35.279
You just keep getting these codes over and over and

69
00:04:35.360 --> 00:04:38.160
over again, and it starts causing a lot of frustration

70
00:04:38.720 --> 00:04:43.519
to where you just automatically go okay, and you then

71
00:04:43.639 --> 00:04:44.120
use it.

72
00:04:46.199 --> 00:04:48.240
So it'll stop texting you.

73
00:04:48.279 --> 00:04:50.800
But it's really a scammer behind it, knowing that this

74
00:04:50.920 --> 00:04:54.160
is going to frustrate you and get you to then

75
00:04:55.720 --> 00:05:01.079
give the multi factor code. They get your how does

76
00:05:01.120 --> 00:05:03.360
it work? They get your user name and password through

77
00:05:03.360 --> 00:05:08.279
different fishing techniques, breaches or hacks at companies, or maybe

78
00:05:08.319 --> 00:05:12.279
if you've reused a password and they figured that password

79
00:05:12.279 --> 00:05:14.800
out on another account. We've talked about this a lot.

80
00:05:15.199 --> 00:05:17.040
They've got a software where they're going to put that

81
00:05:17.720 --> 00:05:20.959
log in credentials in and it's just automatically going to

82
00:05:21.000 --> 00:05:25.079
scan through thousands of different accounts until it hits and

83
00:05:25.160 --> 00:05:27.759
wherever you've reused that password, it's going to hit and

84
00:05:27.800 --> 00:05:31.839
now they can have they can are closer to having

85
00:05:31.879 --> 00:05:34.920
access because if you have multi factor authentication set up,

86
00:05:35.480 --> 00:05:40.560
then authentication setup, then you're going to have to give

87
00:05:40.600 --> 00:05:42.680
them the code in order for them to be able

88
00:05:42.680 --> 00:05:45.399
to get in. And that's where this MFA fatigue comes in.

89
00:05:46.160 --> 00:05:49.800
They repeatedly send you the MFA log in requests and

90
00:05:49.839 --> 00:05:51.879
then the goal is to wear you down until you

91
00:05:51.920 --> 00:05:59.160
approve the log in, and that sometimes it comes through

92
00:05:59.199 --> 00:06:01.600
where it's just you know, you're trying to log in

93
00:06:01.639 --> 00:06:04.720
as this shoe you see and you just quickly say

94
00:06:04.800 --> 00:06:06.959
yes to get rid of it, because if you say no,

95
00:06:07.120 --> 00:06:08.839
then you're going to get another one that comes back,

96
00:06:08.879 --> 00:06:12.560
and it just keeps coming. So how to protect yourself,

97
00:06:12.680 --> 00:06:18.319
So never approve an unexpected multi factor request and always

98
00:06:18.399 --> 00:06:21.439
use strong, unique passwords for every account. The other thing

99
00:06:21.480 --> 00:06:24.360
I'm going to say, there is a lot of accounts

100
00:06:24.439 --> 00:06:28.000
now give you the option of setting up a pass key,

101
00:06:28.439 --> 00:06:31.240
which is biometric information. And we talked about this just

102
00:06:31.279 --> 00:06:35.839
a couple of weeks ago. It's a facial scam, a fingerprint,

103
00:06:36.639 --> 00:06:38.959
or it's a pin number. Now, that pin number is

104
00:06:39.000 --> 00:06:42.920
different than a multi factor code because you are telling

105
00:06:43.720 --> 00:06:47.600
whichever company you're setting up that pass key with. You're

106
00:06:47.639 --> 00:06:50.839
telling that company, this is your pin number. So it's waiting,

107
00:06:51.279 --> 00:06:53.720
just like it's waiting for you to scan your face

108
00:06:53.800 --> 00:06:56.920
to look for those pinpoints or to scan your fingerprint

109
00:06:56.959 --> 00:06:59.839
to look for those pinpoints on your fingerprint, it's waiting

110
00:06:59.839 --> 00:07:02.519
for you to put that specific code in as a

111
00:07:02.560 --> 00:07:06.240
match to allow you in. So it's an option for you.

112
00:07:06.680 --> 00:07:10.040
But if you are still using passwords, I know a

113
00:07:10.079 --> 00:07:13.040
lot of us like to reuse passwords, But before you

114
00:07:13.120 --> 00:07:17.199
want to reuse a password, just please ask yourself this question.

115
00:07:18.000 --> 00:07:20.680
If I reuse this password on this account and it's

116
00:07:20.759 --> 00:07:25.160
already on this other account, if scammers were to access

117
00:07:25.199 --> 00:07:28.600
it on one of the accounts, it now affects this account,

118
00:07:29.360 --> 00:07:36.279
what damage could be done? And then ask yourself, after

119
00:07:36.360 --> 00:07:38.439
you've figured what damage could be done?

120
00:07:38.480 --> 00:07:40.160
Am I do you want to take that risk?

121
00:07:42.040 --> 00:07:47.199
You can consider the app based authenticators over the text notifications.

122
00:07:47.240 --> 00:07:55.399
The app based authenticators are like Google Authenticator and Microsoft

123
00:07:55.600 --> 00:07:59.759
or no, what is it? Yeah? Microsoft Authenticator, and those

124
00:07:59.800 --> 00:08:05.560
are apps that you download into your into your phone.

125
00:08:05.759 --> 00:08:08.279
And I was just going to look mine up really quick.

126
00:08:12.000 --> 00:08:16.360
Mine is just just.

127
00:08:16.319 --> 00:08:17.519
Called the authenticator.

128
00:08:17.560 --> 00:08:21.959
If you go to if you go to your app store,

129
00:08:22.600 --> 00:08:25.560
you could get on and just look up the authenticator.

130
00:08:25.920 --> 00:08:31.800
But those are more secure than the text based notifications

131
00:08:31.839 --> 00:08:35.120
because the text based ones, those codes last for like

132
00:08:35.200 --> 00:08:40.919
five minutes, maybe ten minutes, but these authenticator apps, those

133
00:08:40.960 --> 00:08:45.000
codes only last for with thirty seconds, and you can

134
00:08:45.080 --> 00:08:47.279
actually see the code when you get in there, and

135
00:08:47.720 --> 00:08:50.320
there's a like a time clock counting down, so you

136
00:08:50.360 --> 00:08:52.639
can see, well, it's already on five seconds. I'm going

137
00:08:52.679 --> 00:08:54.919
to wait until it gets to zero and gives me

138
00:08:54.960 --> 00:08:56.759
a new code to give me time to.

139
00:08:56.720 --> 00:08:58.879
Put it in and get it accepted.

140
00:08:59.759 --> 00:09:02.720
And another thing it says here is to also stay

141
00:09:02.759 --> 00:09:06.159
alert for messages claiming to be it support. Those go

142
00:09:06.279 --> 00:09:09.720
around all the time. They just change their techniques. They're

143
00:09:09.720 --> 00:09:14.480
basically trying to have you give them access to your devices,

144
00:09:14.960 --> 00:09:18.039
and that can create so much damage if you consider

145
00:09:18.120 --> 00:09:20.240
what you have on your device. So that's called push

146
00:09:20.360 --> 00:09:27.919
bombing or multi factor authentication fatigue, which is very very frustrating.

147
00:09:29.039 --> 00:09:34.519
Here's another one. We put this out late last week.

148
00:09:34.679 --> 00:09:38.799
So the genealogy sites, so a lot of people are

149
00:09:38.879 --> 00:09:46.080
using them twenty three and meters I believe was part

150
00:09:46.159 --> 00:09:49.799
of a breach not too long ago, maybe sometime in

151
00:09:49.840 --> 00:09:54.080
the last year. But there's a lot of other genealogy

152
00:09:54.080 --> 00:09:57.519
and DNA platforms as well. But just think about what

153
00:09:58.080 --> 00:10:01.559
you're sharing when you set up the page. There your

154
00:10:01.600 --> 00:10:04.799
full name, including your maiden names, your birth dates, the

155
00:10:04.919 --> 00:10:09.519
locations the current location where you live, plus any past locations,

156
00:10:09.559 --> 00:10:13.240
your family relationships, a lot of history, and you might,

157
00:10:13.440 --> 00:10:16.240
you know, think, well, this feels harmless because you're trying

158
00:10:16.320 --> 00:10:23.080
to you know, figure out, you know, who your ancestry

159
00:10:23.159 --> 00:10:25.440
and stuff. And that's a great thing to do, right

160
00:10:25.559 --> 00:10:31.320
especially there's people that have been adopted and they didn't

161
00:10:31.360 --> 00:10:35.919
know who their birth parents were, or they have a

162
00:10:35.919 --> 00:10:39.200
whole other family out there and they want to be

163
00:10:39.240 --> 00:10:44.480
able to search to find that family. So it has

164
00:10:44.600 --> 00:10:47.480
a lot of really great benefits to it. You just

165
00:10:47.519 --> 00:10:52.279
have to understand that the information that you're giving, and

166
00:10:52.320 --> 00:10:55.679
then also if there was a breach into that system,

167
00:10:57.039 --> 00:10:59.759
the information that now scammers are going to have access to,

168
00:11:00.000 --> 00:11:03.759
which means you need to be even more diligent at

169
00:11:03.799 --> 00:11:07.799
protecting yourself and watching out for those phishing attempts or

170
00:11:07.840 --> 00:11:12.559
those schmishing attempts or vishing with voicemails and and all

171
00:11:12.559 --> 00:11:15.279
of that. But so scammers use that data they can

172
00:11:15.559 --> 00:11:20.039
answer security questions to access accounts. And this is a

173
00:11:20.039 --> 00:11:23.440
lot of banks, a lot of financial accounts. Have you

174
00:11:23.480 --> 00:11:26.519
set up security questions? And if you think about what

175
00:11:26.600 --> 00:11:31.399
a lot of them. What's your mother's maiden name, you know,

176
00:11:31.440 --> 00:11:35.120
what's the name of your your first pet, what's the

177
00:11:35.200 --> 00:11:40.320
name of your what's your father's middle name, what's the

178
00:11:40.399 --> 00:11:43.960
name of your oldest child, you know, what's the name

179
00:11:44.000 --> 00:11:46.879
of your favorite aunt. Right, So there's a lot of

180
00:11:46.919 --> 00:11:51.120
that genealogy information that can answer those questions. So you know,

181
00:11:51.519 --> 00:11:55.879
something to think about with those security questions is do

182
00:11:55.919 --> 00:11:57.960
you ask yourself, do I really have to give the

183
00:11:58.000 --> 00:11:58.679
truth out?

184
00:11:59.480 --> 00:12:00.759
If I love on these.

185
00:12:00.639 --> 00:12:05.039
Questions, it's my answer that I put down, whether I'm

186
00:12:05.120 --> 00:12:07.399
lying or I'm truthful, this is the answer I want

187
00:12:07.399 --> 00:12:10.080
to give. The only thing is if you're going to lie,

188
00:12:10.879 --> 00:12:15.600
then you need to record at someplace because you're not

189
00:12:15.679 --> 00:12:19.360
going to You're most likely not going to remember what

190
00:12:19.480 --> 00:12:24.399
you put in that was a lie, right, So just

191
00:12:24.600 --> 00:12:26.799
record it someplace so if you ever have to answer

192
00:12:26.840 --> 00:12:30.159
those questions, you have them available. If you use a

193
00:12:30.159 --> 00:12:34.159
password manager, you can get into that account in your vault,

194
00:12:34.159 --> 00:12:36.679
and they usually have a place for notes, and that's

195
00:12:36.720 --> 00:12:38.679
where I stick mine is down in the notes, so

196
00:12:38.720 --> 00:12:42.840
I could always look it up there. They can scammers

197
00:12:42.840 --> 00:12:46.679
can impersonate relatives, especially in emergency scams. Now they have

198
00:12:46.759 --> 00:12:52.039
their names, they know how they're related to you. They

199
00:12:52.639 --> 00:12:55.960
can also target multiple family members at once. You know,

200
00:12:56.039 --> 00:13:00.600
if there's a bunch of family members in this ancestry tool,

201
00:13:00.840 --> 00:13:04.600
then now they know how everybody's connected, and they can

202
00:13:04.799 --> 00:13:08.159
scour the Internet for information to build profiles on each

203
00:13:08.200 --> 00:13:13.879
person and make more targeted attacks towards somebody. So again

204
00:13:13.879 --> 00:13:18.159
we're not saying don't use the ancestry pages, but understanding

205
00:13:18.600 --> 00:13:21.399
how the information can be used against you. So if

206
00:13:21.440 --> 00:13:24.960
you decide to use these sites, that you make sure

207
00:13:25.039 --> 00:13:28.720
you have it locked down, that you have other areas

208
00:13:28.759 --> 00:13:31.360
of your life locked down, and just be more aware

209
00:13:31.600 --> 00:13:37.679
that you could have more targeted scam attempts, especially using

210
00:13:38.120 --> 00:13:43.600
one of your family member's names. So you keep your

211
00:13:43.600 --> 00:13:47.679
family trees private. I'm sure it's in there in the settings.

212
00:13:48.080 --> 00:13:50.919
You can set it up that only you can access it.

213
00:13:52.080 --> 00:13:56.600
Avoid sharing full birth dates and maiden names. You know,

214
00:13:56.639 --> 00:13:59.679
A lot of that depends on, especially with the maiden names,

215
00:13:59.759 --> 00:14:03.320
is to how far you want to go through this ancestry,

216
00:14:04.440 --> 00:14:09.039
limit details about living relatives, and just be mindful of

217
00:14:09.080 --> 00:14:15.399
what you upload and where you upload it. So again,

218
00:14:15.519 --> 00:14:19.080
genealogy sites can be really helpful in a lot of

219
00:14:19.080 --> 00:14:25.159
different ways, but just you know, make sure you understand

220
00:14:25.159 --> 00:14:28.600
the information that you're giving, and yes, it's going to

221
00:14:28.679 --> 00:14:31.240
affect you positively because you can find a lot of

222
00:14:31.279 --> 00:14:35.039
long lost relatives, but also understand how it can affect

223
00:14:35.039 --> 00:14:37.799
you negatively, and that way you can prepare for that.

224
00:14:39.279 --> 00:14:42.159
Last week we put out there was a data breach

225
00:14:42.600 --> 00:14:46.600
that we became aware of an identity protection company AURA

226
00:14:47.159 --> 00:14:50.159
has can They confirmed a data breach affecting nearly nine

227
00:14:50.240 --> 00:14:55.399
hundred thousand people names, email addresses, IP addresses, and customer

228
00:14:55.440 --> 00:14:58.200
service data. Now you're going to see it mentions IP

229
00:14:58.399 --> 00:15:03.039
addresses here. When I get into the FBI public service announcements,

230
00:15:03.320 --> 00:15:05.759
one of them is going to be talking specifically about

231
00:15:05.840 --> 00:15:12.720
IP addresses. So it says that no social security numbers, passwords,

232
00:15:12.799 --> 00:15:17.759
or financial data were exposed. But this other information that

233
00:15:17.919 --> 00:15:21.279
they have can be used for phishing scams. That's where

234
00:15:21.279 --> 00:15:25.720
you get the scammer sends you an email trying to

235
00:15:25.759 --> 00:15:28.440
get you to click on links, respond to the email,

236
00:15:28.639 --> 00:15:33.159
call a phone number. Social engineering attacks, that's where they're

237
00:15:33.200 --> 00:15:35.320
going to try to get you to give up information

238
00:15:35.759 --> 00:15:39.600
using your emotions against you. And we just talked about

239
00:15:39.639 --> 00:15:42.279
this on the last one targeted fraud attempts, because now

240
00:15:42.320 --> 00:15:46.279
they have more information on you. So just be cautious

241
00:15:46.919 --> 00:15:52.799
again of the phishing emails or the schmishing text you know,

242
00:15:53.399 --> 00:15:55.559
don't click on the links or the attachments. You're going

243
00:15:55.600 --> 00:15:57.720
to go directly to the verified website or call the

244
00:15:57.840 --> 00:16:02.320
verified phone number to hear those accounts for unusual activity

245
00:16:03.000 --> 00:16:06.159
if you feel if they've been compromised, you know, update

246
00:16:06.200 --> 00:16:10.279
your passwords immediately and consider maybe using a pass key

247
00:16:10.360 --> 00:16:13.440
if they have that available as well. You can also

248
00:16:13.639 --> 00:16:15.840
if you were a victim of fraud, you can put

249
00:16:15.840 --> 00:16:20.440
a fraud alert on your credit through the credit reporting

250
00:16:20.440 --> 00:16:25.240
agencies if you were I believe you can also put

251
00:16:25.240 --> 00:16:29.519
a fraud alert if you were part of a data breach.

252
00:16:29.559 --> 00:16:32.200
If I'm not mistaken that one you're gonna if you

253
00:16:32.279 --> 00:16:34.879
just go in to each one of the three credit

254
00:16:34.919 --> 00:16:37.840
reporting agencies and search fraud alert, it's going to come

255
00:16:37.919 --> 00:16:40.320
up and tell you how to put one on and

256
00:16:40.440 --> 00:16:45.200
the reasons how the reasons as to why you can

257
00:16:45.240 --> 00:16:45.679
have one.

258
00:16:47.159 --> 00:16:48.440
What else do we have here?

259
00:16:49.120 --> 00:16:49.240
Uh?

260
00:16:49.600 --> 00:16:54.559
Fake Google security check. So I actually talked to somebody

261
00:16:54.600 --> 00:17:00.039
in person about this recently, where they were getting a

262
00:17:00.039 --> 00:17:05.960
phone call and someone claiming to be from Google and

263
00:17:06.039 --> 00:17:08.960
wanted to you know, check the security and make sure

264
00:17:08.960 --> 00:17:10.920
their account was secure and all of that.

265
00:17:12.079 --> 00:17:12.920
But it's not just.

266
00:17:15.400 --> 00:17:17.599
It's not just phone calls, right, They can send you

267
00:17:17.640 --> 00:17:18.680
an email as well.

268
00:17:18.920 --> 00:17:21.400
So they're creating.

269
00:17:22.440 --> 00:17:26.160
Convincing fake Google security pages to trick you into installing

270
00:17:26.200 --> 00:17:29.440
malware on your device. It may look like you're protecting

271
00:17:29.440 --> 00:17:34.400
your account. You're going to have login verification codes, personal

272
00:17:34.480 --> 00:17:42.319
data and contact your location, you know. But so the

273
00:17:42.359 --> 00:17:45.960
scary part here is that the scammers haven't hacked into

274
00:17:46.000 --> 00:17:50.200
your Google security you know, your Google page. It's they've

275
00:17:50.240 --> 00:17:54.519
tricked you into granting access to it. So just again,

276
00:17:54.640 --> 00:17:57.880
don't trust the pop ups. Always go directly to the

277
00:17:57.920 --> 00:18:00.880
official you know, you know how to log into your

278
00:18:00.920 --> 00:18:02.200
Google security page.

279
00:18:02.680 --> 00:18:04.039
Just go directly.

280
00:18:03.680 --> 00:18:07.839
There and check things out and make sure you know,

281
00:18:07.920 --> 00:18:10.359
you keep your logins and all that stuff.

282
00:18:12.559 --> 00:18:13.960
Safe and confidential.

283
00:18:14.519 --> 00:18:18.160
Digital Spring cleaning this was the Tip Tuesday or actually

284
00:18:18.240 --> 00:18:21.000
I'm I'm talking about this now, but this has not

285
00:18:21.079 --> 00:18:23.599
come out on your email as a Tip Tuesday. It

286
00:18:23.799 --> 00:18:26.680
probably and it's not going to be today's either. It

287
00:18:26.880 --> 00:18:31.359
might be next weeks on April seventh, I think, is

288
00:18:31.359 --> 00:18:32.759
when this one's going to come out, But you're going

289
00:18:32.799 --> 00:18:34.359
to get it early if you're listening to this.

290
00:18:35.039 --> 00:18:36.359
So we always do.

291
00:18:36.279 --> 00:18:39.400
Spring cleaning right in our homes, well we also need

292
00:18:39.440 --> 00:18:43.240
to think about spring cleaning with our digital life. You

293
00:18:43.279 --> 00:18:46.319
want to back up important files, your photos, your documents,

294
00:18:46.359 --> 00:18:50.880
your financial records. You can use both iCloud and external storage.

295
00:18:51.240 --> 00:18:53.839
And the external storage is you're actually going to have

296
00:18:53.880 --> 00:18:58.920
to buy a backup storage device from a store or

297
00:18:59.000 --> 00:19:02.720
Amazon someplace online, and you're going to have to actually

298
00:19:03.599 --> 00:19:06.839
plug it into your device and then back it up.

299
00:19:07.240 --> 00:19:10.160
When it asked where you'll have to go in and

300
00:19:10.400 --> 00:19:14.319
instead of the iCloud, you'll pick one of the drives,

301
00:19:14.359 --> 00:19:17.839
so you know, it could be it's usually a letter

302
00:19:18.000 --> 00:19:22.319
drive like maybe E F G H something like that,

303
00:19:22.480 --> 00:19:25.400
but it'll it should automatically come up and tell you

304
00:19:26.880 --> 00:19:31.400
which drive it's in and say that it's an external device.

305
00:19:32.039 --> 00:19:34.920
But I'm just looking on my phone, so the iCloud one.

306
00:19:35.319 --> 00:19:37.400
So if you and these instructions are going to be

307
00:19:37.640 --> 00:19:42.160
on the email that comes out. But I have an iPhone,

308
00:19:42.279 --> 00:19:44.960
So if I click on settings and then I click

309
00:19:45.000 --> 00:19:48.960
on my name and then I'm trying to oh, and

310
00:19:49.000 --> 00:19:51.799
then one of the options is iCloud, So I click

311
00:19:51.880 --> 00:19:58.559
on that, it's going to come up and and say,

312
00:19:58.759 --> 00:20:01.799
like mine says upgrade, I need to upgrade for more storage.

313
00:20:03.039 --> 00:20:06.279
But it gives you saved to the iCloud. It tells

314
00:20:06.319 --> 00:20:09.119
you everything you've saved to the I Cloud. But then

315
00:20:09.200 --> 00:20:14.440
you could go into iCloud backup, and then you could

316
00:20:14.519 --> 00:20:18.000
save back up to this phone, back up over cellular

317
00:20:19.200 --> 00:20:23.880
and then back up now, and you click back up now,

318
00:20:23.960 --> 00:20:25.880
and it's going to go through and it's going to

319
00:20:25.920 --> 00:20:30.400
back things up. Android is very similar. If you're in

320
00:20:30.480 --> 00:20:32.839
those instructions will be on the email that comes out.

321
00:20:34.839 --> 00:20:36.880
But if you don't want to wait until next week

322
00:20:36.920 --> 00:20:38.559
for the email to come out, you could always just

323
00:20:38.640 --> 00:20:42.680
google how to back up on an my Android device

324
00:20:42.839 --> 00:20:48.000
to the cloud. So you're going to want to take

325
00:20:49.480 --> 00:20:52.680
one backup unplugged, so that's going to be that external

326
00:20:52.839 --> 00:20:55.759
backup and you're going to want to store it safely,

327
00:20:55.880 --> 00:20:59.880
So just store it someplace where someone can't just you know,

328
00:21:00.000 --> 00:21:02.400
they're usually very small, take it, put it in there,

329
00:21:02.599 --> 00:21:03.440
you know, put it in.

330
00:21:03.400 --> 00:21:06.240
A bag, and you don't know that it's gone. So

331
00:21:06.279 --> 00:21:07.599
you want to keep it in a lock.

332
00:21:07.559 --> 00:21:11.359
Secured place and just make sure you update your devices regularly.

333
00:21:12.880 --> 00:21:14.880
Excuse me, you know this is something you know, we

334
00:21:14.920 --> 00:21:18.079
talk a lot about in her presentations. One of the

335
00:21:18.079 --> 00:21:19.960
things you can do, or one of the tips we

336
00:21:20.000 --> 00:21:22.559
give out, is to have a trusted tech support person.

337
00:21:23.039 --> 00:21:25.359
You might not have a need for that person because

338
00:21:25.720 --> 00:21:28.319
all your devices might be running fine, you don't need

339
00:21:28.359 --> 00:21:31.000
to talk to them about any issues you're having, but

340
00:21:31.160 --> 00:21:32.960
at some point you're going to need their help, and

341
00:21:33.000 --> 00:21:34.920
you don't want to panic and just pick the first

342
00:21:34.960 --> 00:21:37.559
person that comes up on a Google search who could

343
00:21:37.559 --> 00:21:41.519
be a scammer, you know, posing as a legitimate tech

344
00:21:41.599 --> 00:21:46.000
support company that you already know. You're not going to panic,

345
00:21:46.039 --> 00:21:48.440
you know who you're going to call. But a lot

346
00:21:48.480 --> 00:21:53.000
of the tech support people also and it's usually subscription based,

347
00:21:53.119 --> 00:21:57.599
but they will have a plan that you can subscribe

348
00:21:57.640 --> 00:22:01.400
to where they will go in on a regular basis

349
00:22:01.480 --> 00:22:05.880
and check for updates on your device and automatically make

350
00:22:05.920 --> 00:22:09.880
sure that those are running. And then they'll if there's

351
00:22:09.920 --> 00:22:12.279
a new product, you know, that comes out that they

352
00:22:12.319 --> 00:22:16.359
think might work, Like if they're working with your antivirus

353
00:22:17.279 --> 00:22:19.799
and a new product comes out that they think will

354
00:22:19.799 --> 00:22:22.039
work better for you, then they'll say, hey, you know

355
00:22:22.480 --> 00:22:25.759
this new product's out. It's an increase in a subscription price,

356
00:22:25.960 --> 00:22:27.799
but I think it's worth the money because it's going

357
00:22:27.839 --> 00:22:30.039
to help you with this, this, and this. So they're

358
00:22:30.079 --> 00:22:34.759
really good to have. So that's the digital sprint cleaning

359
00:22:35.400 --> 00:22:40.799
house stealing. This happens unfortunately a lot, not just in Arizona.

360
00:22:41.039 --> 00:22:46.200
All over the United States. People's titles deeds to their

361
00:22:46.200 --> 00:22:49.400
houses actually get stolen, especially if there is no lean

362
00:22:49.920 --> 00:22:53.240
on the property. There's no in Arizona. There's nothing for

363
00:22:53.359 --> 00:22:58.319
the recorder to stop the recorder from transferring it because

364
00:22:58.359 --> 00:23:00.640
there's no lean. You know, if they pull the property

365
00:23:00.720 --> 00:23:03.160
up and there's a lien on it, it doesn't matter

366
00:23:03.240 --> 00:23:05.000
who's standing in front of them. It could even be

367
00:23:05.119 --> 00:23:07.160
you standing in front of them trying to change the

368
00:23:07.200 --> 00:23:10.319
title or it could you know, then they are going

369
00:23:10.400 --> 00:23:12.359
to say, we can't transfer this. This lean has to

370
00:23:12.359 --> 00:23:15.599
be satisfied. So they need a lian release to have

371
00:23:15.680 --> 00:23:19.759
it removed. And so that is a really good preventative tool.

372
00:23:20.200 --> 00:23:23.960
But scammers can you know another thing they can do,

373
00:23:24.000 --> 00:23:27.079
and that's what this one is was talking about. Some

374
00:23:27.119 --> 00:23:30.599
federal agents had uncovered a seventeen million dollar mortgage fraud

375
00:23:30.680 --> 00:23:35.799
scheme targeting vulnerable homeowners, especially the older adults. They stole

376
00:23:35.799 --> 00:23:39.559
the victim's identities, access the property records, and took out

377
00:23:39.559 --> 00:23:43.720
loans against the homes without the homeowner ever knowing. So

378
00:23:43.960 --> 00:23:48.079
the personal information has stolen. Fraudstrets impersonate the homeowner, fake

379
00:23:48.160 --> 00:23:51.079
documents are created, and loans are taken out using the

380
00:23:51.079 --> 00:23:55.000
home as collateral. Now this is where they're This is

381
00:23:55.039 --> 00:23:58.759
identity theft and they're not even stealing the title. They're

382
00:23:58.799 --> 00:24:07.720
just it's mortgage fraud schemes. But once it's discovered, you're

383
00:24:07.759 --> 00:24:11.680
the one left having to fix this problem because the

384
00:24:11.720 --> 00:24:14.400
home is still in your name. They've impersonated you, so

385
00:24:14.960 --> 00:24:17.920
you have to report it as identity theft, get your paperwork,

386
00:24:18.279 --> 00:24:20.640
and then you're gonna have to go Maybe it's just

387
00:24:20.680 --> 00:24:23.759
one mortgage, maybe it's multiple mortgages. You know, whoever, you're

388
00:24:23.759 --> 00:24:25.240
gonna have to go to them and go through that

389
00:24:25.359 --> 00:24:29.119
process of getting them, explaining to them that this was

390
00:24:29.160 --> 00:24:31.279
a fraudulent mortgage and all of this.

391
00:24:31.440 --> 00:24:34.720
And while you might say, well, I won't be.

392
00:24:34.680 --> 00:24:40.559
Out any money with a fake mortgage fraud scheme, but

393
00:24:40.880 --> 00:24:44.759
and maybe maybe that is the case, but maybe not.

394
00:24:46.839 --> 00:24:49.680
But you definitely your time is valuable and do you

395
00:24:49.720 --> 00:24:53.519
want to have to and I'm gonna say, waste your time,

396
00:24:55.000 --> 00:24:57.039
but it's not really you know, at that point, it's

397
00:24:57.079 --> 00:24:59.759
not wasting it because you need to get your identity back.

398
00:25:00.880 --> 00:25:07.599
But just protecting your identity can help with this. And

399
00:25:07.680 --> 00:25:13.519
another thing in Arizona, well, as I'm saying this, I'm

400
00:25:13.559 --> 00:25:19.200
thinking about it. We have a free title alert system.

401
00:25:19.240 --> 00:25:22.119
All the counties in Arizona do, and if the change

402
00:25:22.119 --> 00:25:27.960
in your title happens, you get notified right away. But

403
00:25:28.079 --> 00:25:34.799
I'm wondering if that also will happen if a mortgage

404
00:25:35.759 --> 00:25:42.440
lean is filed on your title, because technically that changes

405
00:25:42.960 --> 00:25:45.039
your title because now you've got to it doesn't change

406
00:25:45.039 --> 00:25:49.119
the name on the title, but it changes it because

407
00:25:49.160 --> 00:25:51.480
you have a lean on your property. Now, if that

408
00:25:51.519 --> 00:25:56.480
would also trigger getting a notification from the county Recorder's office,

409
00:25:56.759 --> 00:26:00.359
that's a question to ask. And you know, with me,

410
00:26:00.440 --> 00:26:04.240
having to pivot at the last minute with today's show.

411
00:26:06.200 --> 00:26:09.000
I haven't looked that up, so that's going to be

412
00:26:09.039 --> 00:26:11.599
something that I'm going to look up and find out.

413
00:26:11.759 --> 00:26:14.279
But so you know, protect yourself.

414
00:26:14.319 --> 00:26:17.039
You want to monitor your property records and title activity.

415
00:26:17.400 --> 00:26:19.920
A lot of credit monitoring companies will do this for you.

416
00:26:20.640 --> 00:26:25.279
Be careful what you share online and there are title monitoring,

417
00:26:25.599 --> 00:26:29.319
title monitoring, and identity protection services. A lot of insurance

418
00:26:29.359 --> 00:26:35.119
companies now offer identity protection policies. One last thing, and

419
00:26:35.160 --> 00:26:39.359
this is with fingerprints. And we became aware of this

420
00:26:39.519 --> 00:26:43.160
from someone that was in one of our presentations that

421
00:26:44.119 --> 00:26:46.640
it was getting harder and harder for her to use

422
00:26:46.720 --> 00:26:52.599
her fingerprint as as a biometric way to get into

423
00:26:52.599 --> 00:26:55.839
her accounts or turn on her device. And it's not

424
00:26:55.880 --> 00:26:58.880
that her fingerprints change, it's just they become harder to

425
00:26:58.960 --> 00:27:02.279
read because your skill and changes. It becomes thinner, dryer.

426
00:27:03.359 --> 00:27:05.079
So here's some things you can do. As you can

427
00:27:05.079 --> 00:27:08.960
add multiple fingerprints, you can re scan your fingerprint on

428
00:27:09.039 --> 00:27:13.039
a regular basis, so as your skin naturally becomes thinner

429
00:27:13.079 --> 00:27:17.079
and drier, it's going to recognize the most recent scan

430
00:27:17.240 --> 00:27:19.920
that you did. You can also set up facial recognition

431
00:27:20.400 --> 00:27:24.799
to do that instead of the fingerprint or the pin

432
00:27:24.880 --> 00:27:28.920
number if they allow the pin number. So now we're

433
00:27:28.920 --> 00:27:35.839
going to go to some internet some public service announcements.

434
00:27:35.920 --> 00:27:41.119
So this is one protecting your devices from becoming a

435
00:27:41.160 --> 00:27:43.920
tool for criminals. This one came out on March twelfth.

436
00:27:44.480 --> 00:27:48.559
Now this is where it talks about IP addresses, So

437
00:27:48.839 --> 00:27:54.920
it's a residential proxy. So that's an intermediary server between

438
00:27:55.240 --> 00:27:58.359
the individual and the websites that you visit to make

439
00:27:58.400 --> 00:28:04.559
the connections appear or originate. So legitimate IP addresses assigned

440
00:28:04.599 --> 00:28:06.680
by they're signed by an.

441
00:28:06.519 --> 00:28:10.400
Internet service provider, so.

442
00:28:11.839 --> 00:28:18.240
They can go into TV streaming devices, digital picture frames, smartphones, tablets, routers,

443
00:28:18.839 --> 00:28:20.039
they're all used.

444
00:28:21.680 --> 00:28:22.319
For traffic.

445
00:28:22.920 --> 00:28:28.559
But once the internet connected device is compromised, the device's

446
00:28:28.599 --> 00:28:35.599
IP address can be used by criminals to mask their

447
00:28:35.640 --> 00:28:43.039
online illegal activity, making it appear that the individual, the consumer,

448
00:28:43.160 --> 00:28:46.079
the person in the household is responsible because it's their

449
00:28:46.160 --> 00:28:50.559
IP address, and now a device was compromised that was

450
00:28:50.640 --> 00:28:54.680
using that IP address, So now the criminal could possibly

451
00:28:54.960 --> 00:28:59.640
then start using that IP address to funnel their illegal activities.

452
00:29:00.200 --> 00:29:06.200
So just to give you an understanding as to how

453
00:29:06.240 --> 00:29:11.359
the residential proxies They're used to route users request through

454
00:29:11.440 --> 00:29:16.720
another Internet device, typically located elsewhere. So when selecting an

455
00:29:16.759 --> 00:29:20.240
IP address, users can choose which country they would like

456
00:29:20.279 --> 00:29:23.240
the IP address from down to the city and state.

457
00:29:23.559 --> 00:29:27.000
So if anybody uses a virtual private network, then you're

458
00:29:27.000 --> 00:29:29.519
familiar with this because you can go in and you

459
00:29:29.559 --> 00:29:31.640
can tell it and it's going to come up and

460
00:29:32.640 --> 00:29:34.839
I use one, and so it'll come up with Phoenix.

461
00:29:35.400 --> 00:29:38.359
But it'll also I could say I'm in Miami, i

462
00:29:38.400 --> 00:29:41.079
could say I'm just in Florida. I could say I'm

463
00:29:41.119 --> 00:29:44.000
in a totally another country. You know, there's a lot

464
00:29:44.000 --> 00:29:46.839
of different places you can pick from. And so if

465
00:29:46.880 --> 00:29:50.440
I say I'm in Miami, Florida, well then anybody that

466
00:29:50.559 --> 00:29:54.079
looks at what I'm doing while I'm using that virtual

467
00:29:54.119 --> 00:29:58.440
private network, it looks like I'm actually in Miami, Florida.

468
00:29:59.039 --> 00:30:02.000
So that's how that IP address works, where they say

469
00:30:02.039 --> 00:30:04.319
you can select it down to the city and state,

470
00:30:04.799 --> 00:30:11.480
so it alters the perspective of where that website traffic

471
00:30:12.000 --> 00:30:19.039
was routed through. So some of the things you can do.

472
00:30:20.599 --> 00:30:23.720
These are some methods you can use to acquire residential

473
00:30:23.759 --> 00:30:29.559
IP address. The virtual Private network is a big one

474
00:30:29.599 --> 00:30:33.480
with hidden terms of service, so free virtual private network

475
00:30:33.480 --> 00:30:37.640
services may enroll users' devices with a residential proxy network

476
00:30:37.720 --> 00:30:41.240
without obtaining their consent. The details are often hidden in

477
00:30:41.279 --> 00:30:44.160
the terms of service, which most users do not read

478
00:30:44.759 --> 00:30:48.000
prior to download. And this is where we talked about

479
00:30:48.039 --> 00:30:53.240
recently having a dedicated IP address, and that is something

480
00:30:53.279 --> 00:30:56.400
when you're looking at virtual private networks, you can look

481
00:30:56.440 --> 00:30:59.240
in what they offer and see if it makes sure

482
00:30:59.279 --> 00:31:00.039
it offers.

483
00:30:59.799 --> 00:31:03.359
A dedicated dedicated.

484
00:31:06.519 --> 00:31:10.960
A dedicated IP address, sorry, because then that'll be your

485
00:31:11.039 --> 00:31:14.680
IP address and you're not sharing it with a whole

486
00:31:14.680 --> 00:31:20.640
bunch of other people. The compromised devices that we just

487
00:31:20.720 --> 00:31:25.680
talked about, especially if you're sharing an IP address with

488
00:31:25.759 --> 00:31:28.480
a bunch of other people, it's not dedicated to you,

489
00:31:28.599 --> 00:31:32.279
it's easier for those your device, your IP address to

490
00:31:32.279 --> 00:31:35.599
be compromised and then getting into your devices or vice versa.

491
00:31:35.839 --> 00:31:38.680
Your devices could be compromised and then get into your

492
00:31:38.680 --> 00:31:39.599
IP address.

493
00:31:40.559 --> 00:31:43.799
So malware, you.

494
00:31:43.759 --> 00:31:48.160
Know you have free online video game content, free sports,

495
00:31:48.160 --> 00:31:53.160
TV shows, movies, free software that normally costs money, can

496
00:31:53.200 --> 00:31:55.920
all contain malware that makes the device part of a

497
00:31:56.000 --> 00:31:59.319
residential proxy network. So just be careful of a lot

498
00:31:59.359 --> 00:32:03.359
of free things go in and read the privacy settings

499
00:32:03.440 --> 00:32:06.960
and make sure that it doesn't say residential proxy network.

500
00:32:09.039 --> 00:32:09.880
And you can.

501
00:32:09.920 --> 00:32:12.720
You can find all of these public service announcements if

502
00:32:12.759 --> 00:32:16.240
you just go to i CEA as in CAT the

503
00:32:16.359 --> 00:32:21.480
number three at dot gov. That's the Internet Crime Complaints

504
00:32:21.480 --> 00:32:24.119
Center dot gov. It's through the FBI, and if you

505
00:32:24.160 --> 00:32:27.279
go under Public Information, which is a tab at the top,

506
00:32:27.359 --> 00:32:30.440
you'll see public service announcements and you can find these

507
00:32:30.559 --> 00:32:34.480
and read through. But these are criminals. How they use

508
00:32:34.519 --> 00:32:39.759
those residential proxies malware distribution, phishing and identity theft. They

509
00:32:39.960 --> 00:32:44.599
spam and fake account creation. They can they can get

510
00:32:44.720 --> 00:32:51.640
data from you, brute force attacks which have lockout mechanisms

511
00:32:51.640 --> 00:33:01.839
in it. Let's see identity and location. They can they

512
00:33:01.839 --> 00:33:07.240
make illegal purchases. They bypass purchase restrict restrictions. They can

513
00:33:07.240 --> 00:33:11.559
take over accounts. This is specifically, you know a bad one.

514
00:33:11.640 --> 00:33:15.440
It's a bank account. So some differ. So tips to

515
00:33:15.559 --> 00:33:19.279
protect yourself avoid TV streaming devices that claim to provide

516
00:33:19.279 --> 00:33:25.480
free sports, TV shows and movies. Exercise caution before downloading

517
00:33:25.559 --> 00:33:29.240
free VPN applications. Don't click on the pop up ads.

518
00:33:31.480 --> 00:33:35.400
Don't download pirated software such as video games and movies.

519
00:33:36.000 --> 00:33:40.759
Because those often can contain malware. Only use official trusted

520
00:33:40.759 --> 00:33:46.000
application stores, so it could be your Google Play Store

521
00:33:46.359 --> 00:33:52.160
or your Apple Play Store or your app store. I mean,

522
00:33:54.000 --> 00:33:57.079
keep all your operating systems, software, all that stuff up

523
00:33:57.079 --> 00:34:02.000
to date, and you can actually turn on your updates

524
00:34:02.039 --> 00:34:03.039
to go manually.

525
00:34:06.640 --> 00:34:07.640
Let's see.

526
00:34:09.119 --> 00:34:18.239
Suspicious emails, don't click on suspicious links, and then victim

527
00:34:18.360 --> 00:34:19.320
recording and stuff.

528
00:34:19.360 --> 00:34:21.519
So let's go to a different one.

529
00:34:22.239 --> 00:34:25.840
This one is data security risk of using foreign developed

530
00:34:25.920 --> 00:34:30.440
mobile apps in the United States. So users should be

531
00:34:30.440 --> 00:34:34.599
aware of what user data these apps request access to

532
00:34:34.679 --> 00:34:37.280
au pond download and we talk about this in our

533
00:34:37.280 --> 00:34:38.519
presentations as well.

534
00:34:40.239 --> 00:34:42.039
When you download an app, a.

535
00:34:42.079 --> 00:34:43.800
Lot of times it's going to ask you to give

536
00:34:43.840 --> 00:34:49.639
permission to certain things on your device. They some platforms

537
00:34:49.679 --> 00:34:52.280
offer the option to invite friends or contacts to use

538
00:34:52.320 --> 00:34:57.519
the apps, or give the app access to your yeah,

539
00:34:57.559 --> 00:35:02.079
to your contacts or maybe your friends on social media.

540
00:35:02.239 --> 00:35:03.039
If those are.

541
00:35:05.360 --> 00:35:08.559
Default permissions or if you've granted those permissions, well then

542
00:35:08.599 --> 00:35:14.559
the developer companies can store all that data and address books,

543
00:35:14.599 --> 00:35:18.320
the names, email addresses, physical addresses, whatever you have in

544
00:35:18.360 --> 00:35:22.519
your stored contacts, and this is you know. They can

545
00:35:22.559 --> 00:35:26.320
then also make they can spoof a contacts name and

546
00:35:26.519 --> 00:35:30.840
phone number when they're calling you. The app's privacy policies

547
00:35:30.880 --> 00:35:34.559
list where the collected data, personal information, all that is stored.

548
00:35:36.119 --> 00:35:39.079
They might store it on servers located in China for

549
00:35:39.119 --> 00:35:42.559
as long as the developers deem necessary. Some apps allow

550
00:35:42.760 --> 00:35:46.000
users to choose to run the app locally by downloading

551
00:35:46.039 --> 00:35:52.360
a version directly to the user's devices, which allows users

552
00:35:52.440 --> 00:35:57.320
to run queries without accepting the cloud based version, which

553
00:35:57.320 --> 00:36:00.599
could then or then it prevents the data transfer to

554
00:36:00.679 --> 00:36:06.119
China or third third party country. Some apps also contain

555
00:36:06.280 --> 00:36:11.039
malware which is going to get more information and could

556
00:36:11.119 --> 00:36:15.400
actually give the bad actors access to whatever device. So please,

557
00:36:15.519 --> 00:36:17.159
I think the moral of the story here is just

558
00:36:17.519 --> 00:36:21.199
always download from those verified stores, your Google Play Store,

559
00:36:21.280 --> 00:36:25.519
your App store, And when you're getting ready to download,

560
00:36:25.599 --> 00:36:29.239
it's going to come up and it's going to say

561
00:36:29.320 --> 00:36:32.719
it should tell you these are the default permissions or

562
00:36:32.760 --> 00:36:36.280
the mandatory permissions, but it's going to say want you

563
00:36:36.360 --> 00:36:40.000
to give access maybe to your location, your contacts, different things,

564
00:36:40.239 --> 00:36:42.760
And you have to ask yourself, why does this app

565
00:36:42.800 --> 00:36:46.039
need to know my location wherever I'm at? Then don't

566
00:36:46.039 --> 00:36:49.920
give them that access? Same thing with your contacts, same

567
00:36:49.960 --> 00:36:51.679
thing with the social media. You know, you don't have

568
00:36:51.719 --> 00:36:53.840
to give access to all that. If you're not sure

569
00:36:53.880 --> 00:36:56.519
what you've given, what permissions you've given your apps. If

570
00:36:56.519 --> 00:37:00.880
you go into your settings, and I'm going to do this, well,

571
00:37:01.800 --> 00:37:05.320
if you go into your settings and then scroll all

572
00:37:05.320 --> 00:37:07.559
the way down to the bottom, you'll see apps. And

573
00:37:07.599 --> 00:37:11.079
again I'm on an iPhone, there'll be default apps which

574
00:37:11.119 --> 00:37:12.480
you can go in and look at. But then it's

575
00:37:12.519 --> 00:37:15.199
going to list all the different apps that you have

576
00:37:15.280 --> 00:37:17.960
on here. And I have, let's say, American Airlines, so

577
00:37:18.000 --> 00:37:20.880
I can click on American Airlines and it is going

578
00:37:21.360 --> 00:37:25.719
to it says I never allow it to use my location.

579
00:37:26.480 --> 00:37:28.440
I do not give it content to any of my

580
00:37:28.760 --> 00:37:30.360
access to any of my contacts.

581
00:37:30.639 --> 00:37:31.840
I have my camera.

582
00:37:31.559 --> 00:37:38.480
Shut off, and it only has access to add any

583
00:37:38.719 --> 00:37:44.119
airline tickets to my calendar that I purchase. It will

584
00:37:44.199 --> 00:37:48.960
use my cellular data, and it can do in the background,

585
00:37:48.960 --> 00:37:51.280
it can do an app refresh. So just click on

586
00:37:51.360 --> 00:37:54.239
those individual apps and see what you've given permissions to

587
00:37:54.320 --> 00:37:59.159
and you can always turn those permissions off. Last one,

588
00:38:00.119 --> 00:38:02.559
so this isn't one that came out at the beginning

589
00:38:02.559 --> 00:38:06.159
of the month. But criminals impersonating city and county officials

590
00:38:06.199 --> 00:38:11.440
in phishing emails for planning and zoning permits. So here's

591
00:38:11.480 --> 00:38:15.320
how it works. Individuals and businesses with active application for

592
00:38:15.440 --> 00:38:20.159
land use pers are being targeted by criminals impersonating the

593
00:38:20.159 --> 00:38:24.599
city in county planning and zoning board officials. They're fraudulently

594
00:38:24.639 --> 00:38:29.880
requesting fees associated with these permits. So victims receive unsolicited

595
00:38:29.920 --> 00:38:34.880
emails citing their permit informations, zoning application numbers, and or

596
00:38:34.920 --> 00:38:38.480
property addresses. Victims are instructed to pay invoices for fees

597
00:38:38.519 --> 00:38:41.679
related to their permits and directed to make payments via

598
00:38:41.719 --> 00:38:45.559
wire transfer, the cryptocurrency or the peer to peer payment

599
00:38:45.599 --> 00:38:48.519
apps which are the Venmo, the zell, the PayPal. So

600
00:38:48.880 --> 00:38:52.199
this could be an individual because the individual could be

601
00:38:53.519 --> 00:38:55.639
maybe bought a piece of property to build a house on.

602
00:38:57.800 --> 00:39:00.400
So that's an example for an individual. So the end

603
00:39:00.519 --> 00:39:03.800
emails are going to contain detailed, accurate information about planning

604
00:39:03.880 --> 00:39:08.159
and zoning requests. They include property addresses, case numbers, true

605
00:39:08.239 --> 00:39:11.280
names of the city and county officials. The emails use

606
00:39:11.360 --> 00:39:15.360
professional language formatting all that stuff. And remember we've also

607
00:39:15.400 --> 00:39:19.360
talked about in our presentations. You know, there's a generative

608
00:39:19.360 --> 00:39:23.679
text AI software out there that criminals have access to.

609
00:39:23.800 --> 00:39:25.840
They can access the free version of it. They can

610
00:39:25.880 --> 00:39:27.760
also pay for versions of it.

611
00:39:27.800 --> 00:39:29.360
But now, just.

612
00:39:29.320 --> 00:39:35.679
Because you get something that's from the city's zoning planning

613
00:39:35.679 --> 00:39:42.519
and zoning office and the grammars correct, it's got professional language,

614
00:39:42.639 --> 00:39:46.559
doesn't necessarily mean it's legit because scammers can plug this

615
00:39:46.679 --> 00:39:50.960
information into their generative text AI software that they're using

616
00:39:51.079 --> 00:39:53.400
and it's going to print, it's going to give them

617
00:39:53.480 --> 00:39:57.599
professional language, grammar is good, all of that stuff. So

618
00:39:57.639 --> 00:40:00.639
you still need to verify by going to directly to

619
00:40:00.760 --> 00:40:05.719
the planning and zoning and finding out if that information

620
00:40:05.880 --> 00:40:09.840
is accurate. Email addresses are going to contain usernames similar

621
00:40:09.880 --> 00:40:15.039
to the city or counting planning and zoning departments, but

622
00:40:15.119 --> 00:40:21.199
they originate from non governmental domains such as USA dot com.

623
00:40:21.480 --> 00:40:24.320
Just know that government domains are going to be dot gov.

624
00:40:25.519 --> 00:40:30.079
Email delivery maybe time to coincide with ongoing communications with

625
00:40:30.199 --> 00:40:34.960
city officials, and they could have attached PDF invoices and

626
00:40:35.039 --> 00:40:38.559
those could contain malware on there as well. You open

627
00:40:38.599 --> 00:40:41.559
the attachment, but then there might be a link in there.

628
00:40:41.599 --> 00:40:45.639
The attachment itself could contain malware. But it also might

629
00:40:46.159 --> 00:40:48.639
have a link in that attachment to make the payment,

630
00:40:48.679 --> 00:40:50.760
and you click on that link, and now that could

631
00:40:50.760 --> 00:40:55.360
install Mawre on your device. It's always emphasized the urgency,

632
00:40:55.559 --> 00:40:58.360
threatening delays or other obstacles if you don't pay for

633
00:40:58.400 --> 00:41:03.199
this immediately. Don't just assume that these are legitimate just

634
00:41:03.199 --> 00:41:06.519
because they have the seal, the names of officials, they're

635
00:41:06.519 --> 00:41:09.639
on what looks like the city or county letterhead. All

636
00:41:09.679 --> 00:41:12.639
of that, you always want to verify the email addresses,

637
00:41:13.000 --> 00:41:17.320
So write down every single character that's in that email address,

638
00:41:17.639 --> 00:41:20.000
and especially look at what's to the right of the

639
00:41:20.039 --> 00:41:23.159
ad sign the domain name, and make sure that that

640
00:41:23.320 --> 00:41:31.199
matches exactly with the Planning in Zoning's website. And then

641
00:41:31.480 --> 00:41:34.519
make sure that the what's to the left of the

642
00:41:34.559 --> 00:41:37.440
ad sign, which is going to be for the individual

643
00:41:37.519 --> 00:41:43.719
persons email address, that that matches exactly with previous ones

644
00:41:43.760 --> 00:41:47.000
that you know are verified email addresses from that person.

645
00:41:47.280 --> 00:41:50.239
You could always call to the verified phone number to

646
00:41:50.280 --> 00:41:52.559
the Planning and Zoning office and say, I have this

647
00:41:52.639 --> 00:41:56.800
email address for this person. Is this the accurate email address?

648
00:41:57.559 --> 00:42:00.599
You could go to the verified website and check things

649
00:42:00.639 --> 00:42:05.039
out as well. So that is all I have for

650
00:42:05.360 --> 00:42:15.840
today and actually anyways, hopefully you guys got some good

651
00:42:15.880 --> 00:42:17.159
information out of that.

652
00:42:18.679 --> 00:42:21.559
Next week we are going to have David.

653
00:42:21.320 --> 00:42:25.559
Back and we are going to be using a specific

654
00:42:25.599 --> 00:42:30.239
AI platform where we're going to be searching. We're going

655
00:42:30.280 --> 00:42:35.159
to put in some prompts to have it pull information on,

656
00:42:36.239 --> 00:42:39.320
for instance, what is the best anti virus software for

657
00:42:39.559 --> 00:42:43.159
seniors for twenty twenty six, what is the best virtual

658
00:42:43.239 --> 00:42:47.199
private network for seniors for twenty twenty six, And we're

659
00:42:47.239 --> 00:42:49.719
going to show you how you can do those searches

660
00:42:50.039 --> 00:42:53.480
through an AI software program, and how you can get

661
00:42:53.480 --> 00:42:56.360
the verified links is to where the software is pulling

662
00:42:56.400 --> 00:42:59.760
this information, so you can make sure it's actually pulling

663
00:42:59.840 --> 00:43:04.440
the correct information and not it's not pulling information from

664
00:43:04.440 --> 00:43:09.199
a scammer's website. Don't forget to go to Rosadvocacy dot org.

665
00:43:09.559 --> 00:43:11.400
Click on the You can follow us on all the

666
00:43:11.440 --> 00:43:15.159
social media platforms. The YouTube page will host all of

667
00:43:15.199 --> 00:43:19.960
our radio shows along with our Let's Talk about Scams

668
00:43:19.960 --> 00:43:22.480
dot com website. Scroll down to the bottom of the

669
00:43:22.480 --> 00:43:24.880
homepage you can sign up for our emailed and or

670
00:43:24.880 --> 00:43:27.880
our mailed newsletter, and up at the top right schedule

671
00:43:27.920 --> 00:43:30.519
your presentation. Click on that and learn more about all

672
00:43:30.559 --> 00:43:33.679
the different types of presentations we have available, and send

673
00:43:33.760 --> 00:43:35.760
us some information and we'll get back in touch with

674
00:43:35.800 --> 00:43:38.639
you about getting it scheduled. All right until next week,

675
00:43:38.800 --> 00:43:39.159
thank you.

676
00:43:40.760 --> 00:43:44.239
Well, that's all the knowledge for this episode, Julian every

677
00:43:44.360 --> 00:43:48.360
Tuesday at eight am Pacific time on KFOURHG Radio at

678
00:43:48.400 --> 00:43:52.880
KFOURHD dot com, as Joyce explores a variety of knowledge.

679
00:43:52.960 --> 00:43:57.000
So you have the power to make scam protection your healthy.

680
00:43:57.079 --> 00:44:00.360
Have it and until then, feel free to reach out

681
00:44:00.360 --> 00:44:02.920
to Joyce and let's talk about scams.