<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>General &#8211; Tech It From Me</title>
	<atom:link href="https://techitfromme.com/category/general/feed/" rel="self" type="application/rss+xml" />
	<link>https://techitfromme.com</link>
	<description>From 8-bit to boardroom—tech insights from a 30-year IT veteran.</description>
	<lastBuildDate>Wed, 10 Sep 2025 23:48:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://techitfromme.com/wp-content/uploads/2025/07/cropped-SiteIcon-scaled-1-32x32.png</url>
	<title>General &#8211; Tech It From Me</title>
	<link>https://techitfromme.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Rise of AI-Generated Scams: What You Need to Know</title>
		<link>https://techitfromme.com/the-rise-of-ai-generated-scams/</link>
					<comments>https://techitfromme.com/the-rise-of-ai-generated-scams/#respond</comments>
		
		<dc:creator><![CDATA[Mike Madole]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 15:15:25 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://techitfromme.com/?p=779</guid>

					<description><![CDATA[A decade ago, online scams were easy to laugh off. They came wrapped in poor grammar, unconvincing promises of lottery [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>A decade ago, online scams were easy to laugh off. They came wrapped in poor grammar, unconvincing promises of lottery winnings, and questionable hyperlinks that no seasoned internet user would dare click. </p>



<p>The infamous “Nigerian prince” email became a cultural joke. But in 2025, the joke is over.</p>



<p>Today’s scams don’t look like scams. They sound like your boss calling on the phone. They look like your child speaking in a video message. </p>



<p>They arrive as polished, professional emails drafted with flawless English. Artificial intelligence has given criminals a toolset that is cheap, scalable, and alarmingly convincing.</p>



<div class="wp-block-rank-math-toc-block" id="rank-math-toc"><h2>Table of Contents</h2><nav><ul><li><a href="#from-clumsy-emails-to-convincing-fakes">From Clumsy Emails to Convincing Fakes</a></li><li><a href="#why-its-happening-now">Why It’s Happening Now</a></li><li><a href="#the-human-cost">The Human Cost</a></li><li><a href="#fighting-back">Fighting Back</a></li><li><a href="#looking-ahead">Looking Ahead</a></li><li><a href="#conclusion">Conclusion</a></li><li><a href="#fa-qs-about-ai-generated-scams">FAQs About AI-Generated Scams</a></li></ul></nav></div>



<h2 class="wp-block-heading" id="from-clumsy-emails-to-convincing-fakes">From Clumsy Emails to Convincing Fakes</h2>



<p>The most significant shift is credibility. In the past, bad grammar worked in scammers’ favour—it filtered for only the most vulnerable. But generative AI has eliminated that barrier. </p>



<p>Large language models, the same kind of systems I explained in <a href="https://techitfromme.com/behind-the-buzzwords-what-is-a-large-language-model-really/?utm_source=chatgpt.com">Behind the Buzzwords: What Is a Large Language Model Really?</a>, can now produce text that feels indistinguishable from something a trusted colleague or institution might write.</p>



<div class="wp-block-uagb-image aligncenter uagb-block-7e705855 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center"><figure class="wp-block-uagb-image__figure"><img decoding="async" srcset="https://techitfromme.com/wp-content/uploads/2025/08/scamemail-300x300.webp ,https://techitfromme.com/wp-content/uploads/2025/08/scamemail.webp 780w, https://techitfromme.com/wp-content/uploads/2025/08/scamemail.webp 360w" sizes="auto, (max-width: 480px) 150px" src="https://techitfromme.com/wp-content/uploads/2025/08/scamemail-300x300.webp" alt="A sleek laptop on a modern desk displaying a realistic, polished scam email generated by AI, with professional formatting and a trustworthy tone in a well-lit, professional environment." class="uag-image-784" width="300" height="300" title="scamemail" loading="lazy" role="img"/></figure></div>



<p>Pair that with voice cloning and deepfake video, and the con artist no longer needs to bluff. The technology can imitate, and in some cases outperform, human communication. </p>



<p>A scammer doesn’t need to sound like a stranger anymore—they can sound like your manager. They can look like your CFO in a video call. </p>



<p>They can even hold a real-time conversation, powered by a chatbot that never slips up.</p>



<h2 class="wp-block-heading" id="why-its-happening-now">Why It’s Happening Now</h2>



<p>AI-powered scams aren’t new, but 2025 is the year they’ve become unavoidable. The reasons are layered. </p>



<p>Running advanced AI models has become drastically cheaper, and open-source systems mean criminals don’t need to rent power from the likes of OpenAI. </p>



<p>There’s also the dark economy of “scam-as-a-service,” where criminal groups package ready-made tools—complete with cloned voices and phishing scripts—so anyone can deploy them.</p>



<p>What makes this particularly dangerous is the overlap with the massive pool of stolen personal data already circulating on the dark web. </p>



<p>In <a href="https://techitfromme.com/how-cybercriminals-really-get-your-info/?utm_source=chatgpt.com">How Cybercriminals Really Get Your Info</a>, I described how years of data breaches have created black markets for everything from email addresses to banking records. Now, AI uses that data to tailor scams with unsettling precision. </p>



<p>It isn’t just a generic “Dear Customer” anymore. It’s your name, your employer, your account, woven into a message that feels personal.</p>



<p>The cultural context matters too. Deepfakes are no longer exotic; they’ve appeared in entertainment, advertising, and even politics. </p>



<p>When New Hampshire voters received AI-generated robocalls in President Biden’s voice during the 2024 primaries—something <a href="https://edition.cnn.com/2024/01/22/politics/fake-joe-biden-robocall" target="_blank" rel="noopener">CNN later confirmed—it showed </a>how seamlessly synthetic content could slip into public life.</p>



<h2 class="wp-block-heading" id="the-human-cost">The Human Cost</h2>



<figure class="wp-block-image aligncenter size-medium"><img fetchpriority="high" decoding="async" width="300" height="300" src="https://techitfromme.com/wp-content/uploads/2025/08/deepfake-300x300.webp" alt="A distressed person sitting at a home desk, holding a smartphone showing a video call with a familiar-looking face that has subtle digital glitches, suggesting a deepfake. The room is warmly lit, and the person’s expression shows shock and fear, highlighting the emotional impact of AI-driven scams." class="wp-image-785" srcset="https://techitfromme.com/wp-content/uploads/2025/08/deepfake-300x300.webp 300w, https://techitfromme.com/wp-content/uploads/2025/08/deepfake-150x150.webp 150w, https://techitfromme.com/wp-content/uploads/2025/08/deepfake-768x768.webp 768w, https://techitfromme.com/wp-content/uploads/2025/08/deepfake.webp 1024w" sizes="(max-width: 300px) 100vw, 300px" /></figure>



<p>Consider the finance worker who wired $25 million after a video call with a “CFO” who didn’t exist. The voice, the face, the mannerisms—all fabricated. </p>



<p>Or think of the Canadian taxpayer who picks up a call from what sounds precisely like a CRA officer, able to answer questions in real time. </p>



<p>In some of the most chilling cases, parents have been sent videos that appear to show their children kidnapped, only to discover later that it was AI-generated extortion.</p>



<p>What connects these stories isn’t just the fraud—it’s the realism. Criminals are no longer asking you to believe the unbelievable. </p>



<p>They’re using technology to create scenarios that trigger urgency, panic, or trust at precisely the right moment.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="ast-oembed-container " style="height: 100%;"><iframe title="Tech It to the Bank: How Cybercriminals Really Get Your Info" width="1200" height="900" src="https://www.youtube.com/embed/TcvIxEfHvtM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>



<h2 class="wp-block-heading" id="fighting-back">Fighting Back</h2>



<p>Defending against AI-generated scams is far more complicated than deleting spam emails used to be. Technology can help, but human awareness is still the most effective tool. </p>



<p>If a request feels rushed, if a call demands money, if a message tugs too sharply at your emotions, pause before acting. Verify it through another channel. </p>



<p>Even something as simple as calling a known number back can break the illusion.</p>



<p>Businesses, of course, face even higher stakes. </p>



<p>Training employees, enforcing dual approvals for financial transfers, and adopting zero-trust security practices are now essentials rather than best practices. </p>



<p>Many organizations are also beginning to experiment with AI-based defences—systems designed to flag the subtle artifacts that synthetic media leaves behind. It’s an arms race, with one set of algorithms generating deception and another set trying to detect it.</p>



<figure class="wp-block-image aligncenter size-medium"><img decoding="async" width="300" height="300" src="https://techitfromme.com/wp-content/uploads/2025/08/Stylish-Business-Professional-Reviewing-Potential-Scam-Email-300x300.webp" alt="A confident and fashionably dressed female business professional sits at a modern desk, reviewing a suspicious email on a sleek laptop. A red alert icon is visible on the screen, signaling a potential scam. The background features subtle cybersecurity graphics like padlocks and shield icons, representing digital awareness and protection in a professional setting." class="wp-image-787" srcset="https://techitfromme.com/wp-content/uploads/2025/08/Stylish-Business-Professional-Reviewing-Potential-Scam-Email-300x300.webp 300w, https://techitfromme.com/wp-content/uploads/2025/08/Stylish-Business-Professional-Reviewing-Potential-Scam-Email-150x150.webp 150w, https://techitfromme.com/wp-content/uploads/2025/08/Stylish-Business-Professional-Reviewing-Potential-Scam-Email-768x768.webp 768w, https://techitfromme.com/wp-content/uploads/2025/08/Stylish-Business-Professional-Reviewing-Potential-Scam-Email.webp 1024w" sizes="(max-width: 300px) 100vw, 300px" /></figure>



<p>The same cat-and-mouse dynamic also exists in other corners of technology. </p>



<p>In <a href="https://techitfromme.com/the-real-cost-of-ai-whos-paying-for-the-compute-arms-race/?utm_source=chatgpt.com">The Real Cost of AI: Who’s Paying for the Compute Arms Race?</a>, I wrote about how the demand for computing power is reshaping industries. Here, the arms race is between criminals and defenders.</p>



<p> Both sides are armed with the same tools.</p>



<h2 class="wp-block-heading" id="looking-ahead">Looking Ahead</h2>



<p>Some researchers hope <a href="https://techitfromme.com/watermarking-ai-will-it-change-the-way-we-write-forever/" data-type="post" data-id="457">watermarking techniques</a> can help, embedding invisible signals in AI-generated content so that fakes can be spotted instantly. </p>



<p>Others argue that only regulation will make a difference, though governments are already struggling to keep up with simpler issues, such as <a href="https://techitfromme.com/canadas-digital-tax-backtrack-fair-play-or-policy-fail/?utm_source=chatgpt.com">Canada’s digital tax rules</a>.</p>



<p>It’s possible that within a few years, your phone or email client will warn you mid-conversation: <em>“This voice may be synthetic.”</em> Until then, the most effective defence is still the oldest one: healthy skepticism.</p>



<h2 class="wp-block-heading" id="conclusion">Conclusion</h2>



<p>AI-generated scams aren’t just another chapter in the story of cybercrime. They’re a shift in kind, not just in degree. </p>



<p>By making deception faster, cheaper, and more believable than ever, AI has handed criminals a megaphone.</p>



<p>History shows that every technological leap—from the earliest computers to today’s generative models—brings unintended consequences. </p>



<p>As I explained in <a href="https://techitfromme.com/the-real-history-of-ai-from-turing-to-transformers/?utm_source=chatgpt.com">The Real History of AI: From Turing to Transformers</a>, progress is never neutral. The challenge for 2025 is ensuring that AI serves as a shield, not just a weapon.</p>



<figure class="wp-block-image aligncenter size-medium"><img loading="lazy" decoding="async" width="300" height="300" src="https://techitfromme.com/wp-content/uploads/2025/08/Navigating-the-Digital-Crossroads-Vigilance-Against-AI-Generated-Scams-300x300.webp" alt="A person stands at a symbolic crossroads holding a softly glowing smartphone. One path ahead is bright and secure, while the other dissolves into digital static and distortion, representing the threat of AI-generated scams. The individual looks forward with determination, symbolizing awareness, resilience, and the critical choices we face in the age of artificial intelligence." class="wp-image-788" srcset="https://techitfromme.com/wp-content/uploads/2025/08/Navigating-the-Digital-Crossroads-Vigilance-Against-AI-Generated-Scams-300x300.webp 300w, https://techitfromme.com/wp-content/uploads/2025/08/Navigating-the-Digital-Crossroads-Vigilance-Against-AI-Generated-Scams-150x150.webp 150w, https://techitfromme.com/wp-content/uploads/2025/08/Navigating-the-Digital-Crossroads-Vigilance-Against-AI-Generated-Scams-768x768.webp 768w, https://techitfromme.com/wp-content/uploads/2025/08/Navigating-the-Digital-Crossroads-Vigilance-Against-AI-Generated-Scams.webp 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" /></figure>



<p>Until then, the best advice is also the simplest: trust cautiously, verify everything, and remember that not every familiar voice belongs to who it claims to be.</p>



<h2 class="wp-block-heading" id="fa-qs-about-ai-generated-scams">FAQs About AI-Generated Scams</h2>


<div class="wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-06450c25 uagb-faq-icon-row uagb-faq-layout-accordion uagb-faq-expand-first-true uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height     " data-faqtoggle="true" role="tablist"><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-fef6d133 " role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewBox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewBox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question"><strong>What is an AI-generated scam?</strong></span></div><div class="uagb-faq-content"><p>An AI-generated scam utilizes artificial intelligence to create fake yet convincing messages, voices, or videos that trick victims into divulging money or personal information.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-2d8d2ff3 " role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewBox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewBox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question"><strong>How do I spot a deepfake voice scam?</strong></span></div><div class="uagb-faq-content"><p>Watch for unusual phrasing, minor audio glitches, or overly urgent requests. When in doubt, verify through another channel before taking action.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-431d399e " role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewBox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewBox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question"><strong>Can businesses defend against AI scams?</strong></span></div><div class="uagb-faq-content"><p>Yes. Employee training, multi-factor authentication, anomaly detection tools, and layered approval processes are among the most effective defences.</p></div></div></div>


<p><em>(Images generated with the help of DALL-E.)</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://techitfromme.com/the-rise-of-ai-generated-scams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tech It to the Bank: How Cybercriminals Really Get Your Info</title>
		<link>https://techitfromme.com/how-cybercriminals-really-get-your-info/</link>
					<comments>https://techitfromme.com/how-cybercriminals-really-get-your-info/#respond</comments>
		
		<dc:creator><![CDATA[Mike Madole]]></dc:creator>
		<pubDate>Tue, 05 Aug 2025 23:31:42 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Home Tech]]></category>
		<guid isPermaLink="false">https://techitfromme.com/?p=607</guid>

					<description><![CDATA[Think you&#8217;re not important enough to be hacked? Think again. Every day, regular people—students, small business owners, retirees, even IT [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Think you&#8217;re not important enough to be hacked? Think again.</p>



<p>Every day, regular people—students, small business owners, retirees, even IT professionals—fall victim to cybercrime. And it’s not because they’re stupid, careless, or unlucky. It’s because today’s cyberattacks are automated, convincing, and <em>wildly effective</em>.</p>



<p>In this post, I’m breaking down how cybercriminals get your info, based on real-world experience from almost three decades in IT leadership roles. I’ll also give you <strong>5 simple things you can do today</strong> to reduce your risk—no technical expertise required.</p>



<div class="wp-block-rank-math-toc-block" id="rank-math-toc"><h2>Table of Contents</h2><nav><ul><li><a href="#&#x1f575;&#x200d;&#x2642;-the-most-common-ways-hackers-steal-your-data"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f575-fe0f-200d-2642-fe0f.png" alt="🕵️‍♂️" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The Most Common Ways Hackers Steal Your Data</a><ul><li><a href="#&#x1f3a3;-1-phishing"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3a3.png" alt="🎣" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 1. Phishing</a></li><li><a href="#&#x1f9e0;-2-social-engineering"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 2. Social Engineering</a></li><li><a href="#&#x1f4a5;-3-credential-stuffing"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a5.png" alt="💥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 3. Credential Stuffing</a></li><li><a href="#&#x1f4f6;-4-fake-public-wi-fi"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f6.png" alt="📶" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 4. Fake Public Wi-Fi</a></li><li><a href="#&#x1f4f1;-5-malicious-apps-and-extensions"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f1.png" alt="📱" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 5. Malicious Apps and Extensions</a></li></ul></li><li><a href="#&#x1f9e9;-why-youre-more-vulnerable-than-you-think"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e9.png" alt="🧩" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Why You’re More Vulnerable Than You Think</a></li><li><a href="#&#x1f6e1;-5-things-you-can-do-to-protect-yourself"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 5 Things You Can Do to Protect Yourself</a><ul><li><a href="#&#x2705;-1-use-a-password-manager"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 1. Use a Password Manager</a></li><li><a href="#&#x1f510;-2-turn-on-mfa"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f510.png" alt="🔐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 2. Turn on MFA</a></li><li><a href="#&#x267b;-3-stop-reusing-passwords"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/267b.png" alt="♻" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 3. Stop Reusing Passwords</a></li><li><a href="#&#x1f6a9;-4-be-skeptical-of-public-wi-fi"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a9.png" alt="🚩" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 4. Be Skeptical of Public Wi-Fi</a></li><li><a href="#&#x1f310;-5-use-a-vpn-like-cloudflare-warp"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f310.png" alt="🌐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 5. Use a VPN—Like Cloudflare WARP</a></li></ul></li><li><a href="#&#x1f9e0;-lessons-from-the-it-trenches"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Lessons from the IT Trenches</a></li><li><a href="#&#x1f3ac;-final-thoughts"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3ac.png" alt="🎬" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Final Thoughts</a><ul><li><a href="#&#x2705;-like-this-post-share-it-with-a-friend"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Like this post? Share it with a friend.</a></li></ul></li></ul></nav></div>


<div id="534366966" class="castos-player dark-mode " tabindex="0" data-episode="604" data-player_id="534366966">
	<div class="player">
		<div class="player__main">
			<div class="player__artwork player__artwork-604">
				<img decoding="async" src="https://techitfromme.com/wp-content/uploads/2025/07/43863249-1749643549763-29e3ec27fe436-150x150.jpg"
					 alt="Tech It From Me"
					 title="Tech It From Me">
			</div>
			<div class="player__body">
				<div class="currently-playing">
					<div class="show player__podcast-title">
						Tech It From Me					</div>
					<div class="episode-title player__episode-title">Tech It to the Bank: How Cybercriminals Really Get Your Info</div>
				</div>
				<div class="play-progress">
					<div class="play-pause-controls">
						<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
							<span class="screen-reader-text">Play Episode</span>
						</button>
						<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
							<span class="screen-reader-text">Pause Episode</span>
						</button>
						<img decoding="async" src="https://techitfromme.com/wp-content/plugins/seriously-simple-podcasting/assets/css/images/player/images/icon-loader.svg" alt="Loading" class="ssp-loader hide"/>
					</div>
					<div>
						<audio preload="none" class="clip clip-604">
							<source src="https://techitfromme.com/wp-content/uploads/2025/08/episode10-2025-08-02-10.08-AM.mp3">
						</audio>
						<div class="ssp-progress" role="progressbar" title="Seek" aria-valuenow="0" aria-valuemin="0" aria-valuemax="997">
							<span class="progress__filled"></span>
						</div>
						<div class="ssp-playback playback">
							<div class="playback__controls">
								<button class="player-btn player-btn__volume" title="Mute/Unmute">
									<span class="screen-reader-text">Mute/Unmute Episode</span>
								</button>
								<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
									<span class="screen-reader-text">Rewind 10 Seconds</span>
								</button>
								<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
								<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
									<span class="screen-reader-text">Fast Forward 30 seconds</span>
								</button>
							</div>
							<div class="playback__timers">
								<time class="ssp-timer">00:00</time>
								<span>/</span>
								<!-- We need actual duration here from the server -->
								<time class="ssp-duration" datetime="PT0H16M37S">16:37</time>
							</div>
						</div>
					</div>
				</div>
									<nav class="player-panels-nav">
													<button class="subscribe-btn" id="subscribe-btn-604" title="Subscribe">Subscribe</button>
																			<button class="share-btn" id="share-btn-604" title="Share">Share</button>
											</nav>
							</div>
		</div>
	</div>
			<div class="player-panels player-panels-604">
							<div class="subscribe player-panel subscribe-604">
					<div class="close-btn close-btn-604">
						<span></span>
						<span></span>
					</div>
					<div class="panel__inner">
						<div class="subscribe-icons">
																								<a href="https://techitfromme.com/amazonmusic" target="_blank" rel="noopener noreferrer" class="amazon" title="Subscribe on  Amazon">
										<span></span>
										Amazon									</a>
																																<a href="https://techitfromme.com/apple" target="_blank" rel="noopener noreferrer" class="apple_podcasts" title="Subscribe on  Apple Podcasts">
										<span></span>
										Apple Podcasts									</a>
																																<a href="https://techitfromme.com/spotify" target="_blank" rel="noopener noreferrer" class="spotify" title="Subscribe on  Spotify">
										<span></span>
										Spotify									</a>
																																<a href="https://techitfromme.com/youtubepodcasts" target="_blank" rel="noopener noreferrer" class="youtube" title="Subscribe on  YouTube">
										<span></span>
										YouTube									</a>
																					</div>
						<div class="player-panel-row" aria-label="RSS Feed URL">
							<div class="title">RSS Feed</div>
							<div>
								<input value="https://techitfromme.com/feed/podcast/tech-it-from-me" class="input-rss input-rss-604" title="RSS Feed URL" readonly />
							</div>
							<button class="copy-rss copy-rss-604" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
						</div>
					</div>
				</div>
										<div class="share share-604 player-panel">
					<div class="close-btn close-btn-604">
						<span></span>
						<span></span>
					</div>
					<div class="player-panel-row">
						<div class="title">
							Share						</div>
						<div class="icons-holder">
							<a href="https://www.facebook.com/sharer/sharer.php?u=https://techitfromme.com/podcast/how-cybercriminals-really-get-your-info/&#038;t=Tech It to the Bank: How Cybercriminals Really Get Your Info" target="_blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
								<span></span>
							</a>
							<a href="https://twitter.com/intent/tweet?text=https://techitfromme.com/podcast/how-cybercriminals-really-get-your-info/&#038;url=Tech It to the Bank: How Cybercriminals Really Get Your Info" target="_blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
								<span></span>
							</a>
							<a href="https://techitfromme.com/wp-content/uploads/2025/08/episode10-2025-08-02-10.08-AM.mp3" target="_blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
								<span></span>
							</a>
						</div>
					</div>
					<div class="player-panel-row">
						<div class="title">
							Link						</div>
						<div>
							<input value="https://techitfromme.com/podcast/how-cybercriminals-really-get-your-info/" class="input-link input-link-604" title="Episode URL" readonly />
						</div>
						<button class="copy-link copy-link-604" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					</div>
					<div class="player-panel-row">
						<div class="title">
							Embed						</div>
						<div style="height: 10px;">
							<input type="text" value='&lt;blockquote class=&quot;wp-embedded-content&quot; data-secret=&quot;x0xwnN2N0e&quot;&gt;&lt;a href=&quot;https://techitfromme.com/podcast/how-cybercriminals-really-get-your-info/&quot;&gt;Tech It to the Bank: How Cybercriminals Really Get Your Info&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox=&quot;allow-scripts&quot; security=&quot;restricted&quot; src=&quot;https://techitfromme.com/podcast/how-cybercriminals-really-get-your-info/embed/#?secret=x0xwnN2N0e&quot; width=&quot;500&quot; height=&quot;350&quot; title=&quot;&#8220;Tech It to the Bank: How Cybercriminals Really Get Your Info&#8221; &#8212; Tech It From Me&quot; data-secret=&quot;x0xwnN2N0e&quot; frameborder=&quot;0&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; scrolling=&quot;no&quot; class=&quot;wp-embedded-content&quot;&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){&quot;use strict&quot;;l.querySelector&amp;&amp;d.addEventListener&amp;&amp;&quot;undefined&quot;!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll(&#039;iframe[data-secret=&quot;&#039;+t.secret+&#039;&quot;]&#039;),o=l.querySelectorAll(&#039;blockquote[data-secret=&quot;&#039;+t.secret+&#039;&quot;]&#039;),c=new RegExp(&quot;^https?:$&quot;,&quot;i&quot;),i=0;i&lt;o.length;i++)o[i].style.display=&quot;none&quot;;for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute(&quot;style&quot;),&quot;height&quot;===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):&quot;link&quot;===t.message&amp;&amp;(r=new URL(s.getAttribute(&quot;src&quot;)),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener(&quot;message&quot;,d.wp.receiveEmbedMessage,!1),l.addEventListener(&quot;DOMContentLoaded&quot;,function(){for(var e,t,s=l.querySelectorAll(&quot;iframe.wp-embedded-content&quot;),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute(&quot;data-secret&quot;))||(t=Math.random().toString(36).substring(2,12),e.src+=&quot;#?secret=&quot;+t,e.setAttribute(&quot;data-secret&quot;,t)),e.contentWindow.postMessage({message:&quot;ready&quot;,secret:t},&quot;*&quot;)},!1)))}(window,document);
//# sourceURL=https://techitfromme.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
'
								   title="Embed Code"
								   class="input-embed input-embed-604" readonly/>
						</div>
						<button class="copy-embed copy-embed-604" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
					</div>
				</div>
					</div>
	
	

	</div>
<div class="podcast_meta"><aside><p><a href="https://techitfromme.com/podcast-download/604/how-cybercriminals-really-get-your-info?ref=new_window" target="_blank" title="Tech It to the Bank: How Cybercriminals Really Get Your Info " class="podcast-meta-new-window">Play in new window</a> | <span class="podcast-meta-duration">Duration: 16:37</span> | <span class="podcast-meta-date">Recorded on August 6, 2025</span> | <a href="https://techitfromme.com/wp-content/uploads/2025/08/Ep10Transcription.txt" target="_blank">Download transcript</a></p><p>Subscribe: <a href="https://techitfromme.com/amazonmusic" target="_blank" title="Amazon" class="podcast-meta-itunes">Amazon</a> | <a href="https://techitfromme.com/apple" target="_blank" title="Apple Podcasts" class="podcast-meta-itunes">Apple Podcasts</a> | <a href="https://techitfromme.com/spotify" target="_blank" title="Spotify" class="podcast-meta-itunes">Spotify</a> | <a href="https://techitfromme.com/youtubepodcasts" target="_blank" title="YouTube" class="podcast-meta-itunes">YouTube</a></p></aside></div>


<h2 class="wp-block-heading" id="&#x1f575;&#x200d;&#x2642;-the-most-common-ways-hackers-steal-your-data"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f575-fe0f-200d-2642-fe0f.png" alt="🕵️‍♂️" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The Most Common Ways Hackers Steal Your Data</h2>



<p>Let’s ditch the Hollywood imagery. Nobody is hammering away at your firewall by hand. Cybercriminals use automation to compromise thousands of people at once—and they’re incredibly efficient at it.</p>



<p>Here’s how:</p>



<h3 class="wp-block-heading" id="&#x1f3a3;-1-phishing"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3a3.png" alt="🎣" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 1. Phishing</h3>



<p>Fake emails or texts that mimic trusted brands like Amazon, PayPal, or Microsoft. They get you to click a link, log in, and boom—your credentials are stolen.</p>



<h3 class="wp-block-heading" id="&#x1f9e0;-2-social-engineering"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 2. Social Engineering</h3>



<p>You get a phone call from someone claiming to be IT support. Or HR. Or even your CEO. It sounds urgent. They need your info now. You panic. You give it.</p>



<h3 class="wp-block-heading" id="&#x1f4a5;-3-credential-stuffing"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a5.png" alt="💥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 3. Credential Stuffing</h3>



<p>If you’ve reused the same password across multiple sites, this one’s for you. Hackers take stolen credentials from past breaches (like LinkedIn or Dropbox) and try them on hundreds of other platforms. It works <strong>a lot</strong>.</p>



<h3 class="wp-block-heading" id="&#x1f4f6;-4-fake-public-wi-fi"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f6.png" alt="📶" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 4. Fake Public Wi-Fi</h3>



<p>Ever connected to “Free Airport Wi-Fi”? Sometimes it’s legit. Sometimes it’s a hacker’s laptop. Once you&#8217;re on their network, they can intercept your data.</p>



<h3 class="wp-block-heading" id="&#x1f4f1;-5-malicious-apps-and-extensions"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f1.png" alt="📱" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 5. Malicious Apps and Extensions</h3>



<p>Shady mobile apps or browser extensions ask for more access than they need, then abuse it. They log your keystrokes, scan your clipboard, or upload your data without you knowing.</p>



<h2 class="wp-block-heading" id="&#x1f9e9;-why-youre-more-vulnerable-than-you-think"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e9.png" alt="🧩" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Why You’re More Vulnerable Than You Think</h2>



<p>You don’t need to be rich or famous to get hacked. You need to:</p>



<ul class="wp-block-list">
<li>Reuse passwords</li>



<li>Skip MFA</li>



<li>Click one bad link</li>



<li>Be on the wrong Wi-Fi network</li>
</ul>



<p>Cybercriminals aren’t targeting <em>you</em>—they’re targeting <strong>everyone</strong>.</p>



<p>They run bots that test leaked credentials from old data breaches across platforms like Gmail, Amazon, and PayPal. If you’ve ever used the same password twice, you could be exposed.</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Go check <a>haveibeenpwned.com</a> to see if your email has been in a breach. Spoiler: it probably has.</p>



<h2 class="wp-block-heading" id="&#x1f6e1;-5-things-you-can-do-to-protect-yourself"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 5 Things You Can Do to Protect Yourself</h2>



<h3 class="wp-block-heading" id="&#x2705;-1-use-a-password-manager"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 1. Use a Password Manager</h3>



<p>I use <strong><a href="https://1password.com" target="_blank" rel="noopener">1Password</a></strong>—and I’m not compensated or affiliated with them in any way.</p>



<p>One of the reasons I use it is that it <strong>includes built-in support for MFA codes</strong>, so I don’t need a separate app like Google Authenticator. It syncs across all my devices and makes secure logins effortless.</p>



<p>Other great options include:</p>



<ul class="wp-block-list">
<li>Bitwarden</li>



<li>Dashlane</li>



<li>iCloud Keychain (for Apple-only users)</li>
</ul>



<h3 class="wp-block-heading" id="&#x1f510;-2-turn-on-mfa"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f510.png" alt="🔐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 2. Turn on MFA</h3>



<p>Multi-factor authentication (MFA) adds a second layer of protection to your accounts. If someone steals your password, they still need your phone or device to get in.</p>



<p>Turn this on for:</p>



<ul class="wp-block-list">
<li>Email</li>



<li>Banking</li>



<li>Social media</li>



<li>Cloud storage</li>
</ul>



<h3 class="wp-block-heading" id="&#x267b;-3-stop-reusing-passwords"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/267b.png" alt="♻" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 3. Stop Reusing Passwords</h3>



<p>Every account should have a unique, strong password. If one gets compromised, the rest stay safe. Password managers make this easy.</p>



<h3 class="wp-block-heading" id="&#x1f6a9;-4-be-skeptical-of-public-wi-fi"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a9.png" alt="🚩" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 4. Be Skeptical of Public Wi-Fi</h3>



<p>Don’t trust open networks. They’re convenient, but risky. Avoid logging into sensitive accounts when you’re on them. I have a separate article that talks about <a href="https://techitfromme.com/why-wi-fi-still-sucks-in-2025-and-what-you-can-actually-do-about-it/" data-type="post" data-id="561">issues around wi-fi</a>, and how you can resolve them.</p>



<h3 class="wp-block-heading" id="&#x1f310;-5-use-a-vpn-like-cloudflare-warp"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f310.png" alt="🌐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 5. Use a VPN—Like Cloudflare WARP</h3>



<p>A <strong>VPN encrypts your internet traffic</strong>, making it unreadable to snoops on public networks.</p>



<p>I personally use <strong>Cloudflare WARP</strong>. It’s free, fast, and easy to install—not just on your phone, but on your <strong>Mac or Windows PC too</strong>.</p>



<p> WARP isn’t a full VPN—it doesn’t spoof your location—but it does encrypt your data using Cloudflare’s secure network.<br>Perfect for cafés, airports, or anywhere with <a href="https://techitfromme.com/podcast/why-wi-fi-still-sucks-in-2025/" data-type="podcast" data-id="565">sketchy Wi-Fi</a>.</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4cc.png" alt="📌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <em>I’ll be doing a full episode soon on VPNs: how they work, which ones to avoid, and how to choose the right one.</em></p>



<h2 class="wp-block-heading" id="&#x1f9e0;-lessons-from-the-it-trenches"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Lessons from the IT Trenches</h2>



<p>As someone who’s spent their career in IT leadership, I’ve seen this stuff go sideways.</p>



<p>The most significant security breaches I’ve witnessed didn’t happen because of bad software.<br>They happened because of <strong>one person</strong>:</p>



<ul class="wp-block-list">
<li>Clicking a fake DocuSign email</li>



<li>Reusing an old password</li>



<li>Ignoring a security warning</li>
</ul>



<p>Technology doesn’t get hacked—<strong>people do</strong>.</p>



<p>So my job as an IT leader is to make secure behaviour easier than insecure behaviour. That’s why I advocate for tools like <a href="https://1password.com" target="_blank" rel="noopener">1Password </a>and <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/" target="_blank" rel="noopener">Cloudflare WARP</a>. They reduce friction, and they encourage good habits.</p>



<p>One good decision can stop an entire breach chain.</p>



<h2 class="wp-block-heading" id="&#x1f3ac;-final-thoughts"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3ac.png" alt="🎬" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Final Thoughts</h2>



<p>Let’s recap:</p>



<ul class="wp-block-list">
<li>You <em>are</em> a target, even if you don’t feel like one.</li>



<li>Cybercriminals count on laziness, reuse, and distraction.</li>



<li>Password managers, MFA, and VPNs aren’t optional anymore—they’re essential.</li>
</ul>



<p>You don’t have to fix everything overnight.<br>Just start with one thing.</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f510.png" alt="🔐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Add MFA to your email.<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f511.png" alt="🔑" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Start using a password manager.<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Try a VPN next time you’re on public Wi-Fi.</p>



<p>Security doesn’t have to be scary. It just has to be intentional.</p>



<h3 class="wp-block-heading" id="&#x2705;-like-this-post-share-it-with-a-friend"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Like this post? Share it with a friend.</h3>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3a7.png" alt="🎧" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Listen to the full episode of <em>Tech It From Me</em> wherever you get your podcasts from.</p>



<p>Or check out all episodes at <a>techitfromme.com</a>.</p>



<p>(<em>Feature image generated with the help of DALL-E</em>)</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techitfromme.com/how-cybercriminals-really-get-your-info/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
