『The Geek and The Detective』のカバーアート

The Geek and The Detective

The Geek and The Detective

著者: Amy Lynn
無料で聴く

今ならプレミアムプランが3カ月 月額99円

2026年5月12日まで。4か月目以降は月額1,500円で自動更新します。

概要

Hosted by 2025 Podcaster of the Year Amy Lynn. Cybersecurity is real life. Join Amy Lynn (The Geek), a digital defender, and Detective Derrick Stevens (The Detective) as they break down the hidden dangers of the online world. Born from a 2024 Mesquite police report, this unlikely duo bridges the gap between high level tech strategy and street level investigative grit. Learn to spot cyberstalkers, handle doxing, and stay safe with straight talk and actionable tips to help you fight back. New episodes monthly. Based on actual events.Amy Lynn
エピソード
  • The Digital Con Artist
    2026/04/24
    Most people think a crime requires a physical break-in, like a smashed window or a jimmied lock, but phishing is just a digital version of a silver-tongued con artist walking up to your front door. In this installment of The Geek and The Detective, Amy Lynn, known as the Geek, and veteran Mesquite Detective Derrick Stevens, known as the Detective, unmask the world of social engineering. Phishing isn't a virus that sneaks in through a hole in your software; it is a psychological attack that targets the human operating the machine. The Detective breaks down the anatomy of a long con, where the predator isn't looking for a software exploit but is instead exploiting your trust, your fear, or your sense of urgency. We explore how a simple extra underscore in a social media handle or a slightly misspelled email address can be the "hook" that leads to a total financial wipeout.The conversation for The Geek and The Detective highlights the "Friday Afternoon Trap," a high-pressure tactic where criminals send "urgent" wire transfer requests at 4:30 PM when employees are tired and ready to head home. The Detective shares a staggering case of a local firm that lost eighty thousand dollars because they favored speed over verification. We also dive into the terrifying new frontier of AI Voice Clones and Deepfakes. You will hear how predators use small clips of audio from social media to mimic a loved one’s voice, creating heartless middle-of-the-night emergency calls to scam families out of their life savings. The Geek provides a tactical lesson on unmasking these links using the "Billboard and Steakhouse" trick, teaching you how to hover on a PC or long-press on a phone to see exactly where a digital trail is leading before you click.Harden your digital perimeter by understanding that if a message feels too good to be true, it is a scam; and if it feels too urgent to be real, it is likely a trap. This episode of The Geek and The Detective emphasizes the importance of Multi-Factor Authentication or MFA as the two-key system every digital vault needs. Even if a con artist manages to steal your password, MFA acts as the secondary deadbolt that keeps them on the porch. We discuss how to become a "Digital Ghost" by limiting the amount of personal information you broadcast online, making it harder for a con artist to build a believable profile of your life.Whether you are a business owner or someone looking to protect your family, the takeaway from The Geek and The Detective is to pause and verify. Good security is about building a culture of skepticism where you are not afraid to pick up the phone and call a person back on a known number to confirm a request. By layering your defenses and keeping your "human firewall" updated, you force these digital con artists to move on to an easier target. Join The Geek and The Detective as we break down the high-stakes world of Vishing, Smishing, and modern deception to help you stay one step ahead of the hook.#Phishing #CyberSecurity #SocialEngineering #ScamAlert #IdentityTheft #Deepfakes #WireFraud #TrueCrimeTech #DigitalDefense #OnlineSafety #FraudPrevention #TheGeekAndTheDetective #Vishing #Smishing #MFA #CyberCrime #StaySafeOnline #TechSecurity #DigitalPrivacy #CyberAwarenessBe sure to Like, Subscribe, and Follow to our social media channels:⁠⁠https://www.facebook.com/AmyLynnsVoiceOvers⁠⁠⁠⁠https://www.facebook.com/TheGeekandTheDetective⁠⁠⁠⁠https://twitter.com/amylynnorg⁠⁠⁠⁠https://x.com/GeeknDetective⁠⁠⁠⁠https://www.youtube.com/AmyLynnOrg⁠⁠Visit our website at: ⁠⁠https://www.amylynn.org⁠⁠ ⁠⁠https://www.amylynn.org/thegeekandthedetective⁠⁠Blog: ⁠⁠https://thevoiceofamylynn.wordpress.com⁠⁠
    続きを読む 一部表示
    26 分
  • The Invisible Pickpocket
    2026/03/24

    You don't need to be an expert safecracker to rob someone anymore; you just need a better Wi-Fi signal than the local coffee shop. In this installment of The Geek and The Detective, Amy Lynn, known as the Geek, and veteran Mesquite Detective Derrick Stevens, known as the Detective, step into the world of the Invisible Pickpocket. While a traditional pickpocket needs physical contact, a digital predator can reach into your wallet from three tables away while you are busy looking at pictures of someone's lunch. This episode breaks down the mechanics of the Evil Twin attack, where hackers set up fake networks with names like Cafe Guest Free to lure in unsuspecting travelers. We discuss how your phone is a creature of habit that sees a stronger signal with a familiar name and jumps on it, connecting you directly to a criminal's hardware without you ever taking your device out of your pocket.
    The conversation for The Geek and The Detective moves from the coffee shop to the airport, which hackers treat like the Super Bowl of targets. We explore the dangers of Juice Jacking, where public USB charging ports are used to bypass wireless security and dump your photos and messages directly into a hidden device. To a phone, a data transfer looks just like a charge unless you use a physical USB data blocker to shield the connection. The Detective shares the cold reality of why these crimes are a jurisdictional nightmare to prosecute. If a crime starts in a Chicago airport and the victim lands in London while the pickpocket is in Eastern Europe, the legal red tape becomes a digital black hole. This episode provides a tactical briefing on maintaining your perimeter in public spaces, teaching you how to turn your device into a digital vault before you order your next latte.
    We also dive into the concept of Digital Exhaust and how your phone constantly screams into the void looking for home. This constant broadcasting of probes allows a passive sniffer to record every network you have ever connected to, effectively profiling your routine and high-value status. The Geek provides the Ghost Rules for staying invisible, emphasizing that if you are not actively using it, your Wi-Fi toggle needs to be completely off. We discuss the use of a VPN as an armored car that creates a private tunnel through a public crowd, allowing you to stand in a glass house without being seen. This installment of The Geek and The Detective is about moving from fear to empowerment by understanding how the trick works so the magician can no longer fool you.
    Whether you are traveling for business or just grabbing a bagel, the takeaway from The Geek and The Detective is to be your own first responder. We provide a simple code to live by, including the Three Nos for public spaces: no banking, no auto-join, and no updates. By following these baseline rules of digital hygiene and utilizing your own mobile hotspot as a secure vault, you can ensure your private data stays private. Join The Geek and The Detective as we shine a light into the digital shadows and show you how to keep your signals tight and your passwords tighter.
    #Phishing #CyberSecurity #ScamAlert #SocialEngineering #Deepfakes #IdentityTheft #TrueCrime #DigitalDefense #OnlineSafety #FraudPrevention #CyberCrime #PublicWiFi #EvilTwin #JuiceJacking #TravelSafety #TheGeekAndTheDetective #DigitalPrivacy #VPN #AirportSafety #InformationSecurity #StaySafe

    Be sure to Like, Subscribe, and Follow to our social media channels:

    ⁠https://www.facebook.com/AmyLynnsVoiceOvers⁠

    ⁠https://www.facebook.com/TheGeekandTheDetective⁠

    ⁠https://twitter.com/amylynnorg⁠

    ⁠https://x.com/GeeknDetective⁠

    ⁠https://www.youtube.com/AmyLynnOrg⁠

    Visit our website at: ⁠https://www.amylynn.org⁠

    ⁠https://www.amylynn.org/thegeekandthedetective⁠

    Blog: ⁠https://thevoiceofamylynn.wordpress.com⁠

    続きを読む 一部表示
    25 分
  • The Digital Beat Cop
    2026/02/24

    Many users assume a Wi-Fi connection is synonymous with security, unaware that a poorly configured network can serve as an open invitation to hackers. In this installment of The Geek and The Detective, Amy Lynn, known as the Geek, and veteran Mesquite Detective Derrick Stevens, known as the Detective, strip away technical jargon to examine network security through the lens of a precinct veteran. Using the analogy of a home, where the computer is the house and the internet is the street, the firewall acts as the fence, doorbell camera, and alarm system rolled into one. This episode explores the Firewall Paradox, identifying the critical balance between a system that is too permissive and one so restrictive it paralyzes digital functionality. It is about moving beyond basic antivirus to build a perimeter that forces criminals to look for an easier target.
    A firewall acts as a digital beat cop, patrolling the perimeter twenty-four seven and checking every packet of data that tries to sneak in or out. The Detective shares a story about a department-wide fiasco where a new firewall was so aggressive it treated legitimate internal traffic like hostile intrusions, freezing dispatch screens and blocking evidence management software. This perfectly illustrates the challenge of firewall complexity. If your firewall is too strict, it blocks things you actually want; if it is too loose, hackers walk right in. We discuss ports as the digital doors and windows of your house. Hackers systematically knock on every port to see which ones respond, and the firewall acts as the bouncer answering those knocks. We also dive into why people often disable their defenses for convenience, which is like getting rid of a security system because you are tired of typing the code.
    The conversation for The Geek and The Detective also highlights the emotional fallout of a digital breach. The Detective discusses how a victim feels exposed and violated in their own home even when the break-in is digital. We provide practical tuning tips, such as using guest networks for Internet of Things or IoT devices like smart thermostats and cameras. These devices are often weak hinges that allow intruders to bypass a solid front door. Putting them on a separate network ensures that even if one gadget is compromised, it cannot pivot to your family photos or tax files. This episode of The Geek and The Detective encourages you to think like an investigator and act like a defender, providing the tools to oil the hinges, reinforce the frame, and secure your digital borders before a breach occurs.
    Whether you are a home user or a small business owner, the takeaway for The Geek and The Detective is simple: keep your firewall on but tune it. Don't take temporary shortcuts that lead to permanent consequences. We discuss the importance of digital spring cleaning, such as reviewing your allowed programs list every few months and removing old access permissions. Just like a neighborhood watch, thorough checks are good, but you have to avoid harassing the mailman. By layering your defenses with a router firewall, device software, and regular updates, you create multiple barriers that force attackers to work harder.
    #Firewall #CyberSecurity #HomeSecurity #DigitalPerimeter #OnlineSafety #TechTips #NetworkSecurity #CyberCrime #SmartHome #PrivacyMatters #TrueCrimeTech #FirewallExplained #TheGeekAndTheDetective #DigitalProtection #HomeNetworkSecurity #StaySafeOnline

    Be sure to Like, Subscribe, and Follow to our social media channels:

    ⁠https://www.facebook.com/AmyLynnsVoiceOvers⁠

    ⁠https://www.facebook.com/TheGeekandTheDetective⁠

    ⁠https://twitter.com/amylynnorg⁠

    ⁠https://x.com/GeeknDetective⁠

    ⁠https://www.youtube.com/AmyLynnOrg⁠

    Visit our website at: ⁠https://www.amylynn.org⁠

    ⁠https://www.amylynn.org/thegeekandthedetective⁠

    Blog: ⁠https://thevoiceofamylynn.wordpress.com⁠

    続きを読む 一部表示
    24 分
まだレビューはありません