American consumer credit reporting agency
POPULARITY
Categories
Learn how to get and read your free credit reports and spot red flags so you can protect your score and money. How do you set a realistic budget for a big life event without guilt? What's the foolproof way to get and read your free credit reports? In this episode, hosts Sean Pyles and Elizabeth Ayoola discuss wedding budgeting and credit monitoring to help you protect your finances. They open by discussing trip and wedding budgeting trade-offs, like how to prioritize comfort, set spending caps, and decide when to splurge. They share tactics for separating wedding and honeymoon costs, using cash gifts and registries wisely, and staying flexible when real prices blow past early estimates. Then, NerdWallet lead writer Amanda Barroso joins Sean and Elizabeth to answer listeners' questions about how to access and monitor their credit reports. They explain the difference between reports and scores and do a live read-through of Sean's Experian report. They cover how to get free weekly credit reports, how to spot hard vs. soft inquiries, what truly matters to your score, what to ignore, and step-by-step moves to dispute errors with the right bureau(s) fast. NerdWallet's list of the best high-yield savings accounts: https://www.nerdwallet.com/banking/best/high-yield-online-savings-accounts Standout high-yield CDs: https://www.nerdwallet.com/m/banking/standout-cd-rates-2 Enter your deposit, CD term and APY to see what interest you would earn on a certificate of deposit with NerdWallet's free CD calculator: https://www.nerdwallet.com/banking/calculators/cd-calculator Want us to review your budget? Fill out this form — completely anonymously if you want — and we might feature your budget in a future segment! https://docs.google.com/forms/d/e/1FAIpQLScK53yAufsc4v5UpghhVfxtk2MoyooHzlSIRBnRxUPl3hKBig/viewform?usp=header In their conversation, the Nerds discuss: free credit report, credit score, FICO vs VantageScore, how to read a credit report, dispute credit report errors, credit freeze vs lock, Experian, Equifax, TransUnion, hard vs soft inquiry, identity theft credit report, free weekly credit reports, adverse action notice, credit utilization, bank app credit score, frozen credit report, collections on credit report, mortgage on credit report, mixed credit files, verify identity for credit report, step by step read credit report, remove errors from credit report, how to check credit score for free, VantageScore 3.0, FICO score 10T, credit bureau upsell, lock vs freeze security, and travel budget planning. To send the Nerds your money questions, call or text the Nerd hotline at 901-730-6373 or email podcast@nerdwallet.com. Like what you hear? Please leave us a review and tell a friend. Learn more about your ad choices. Visit megaphone.fm/adchoices
Financial institutions are overwhelmed with customer data but lack meaningful insights. Banks and credit unions find it difficult to accurately identify their customers across scattered digital channels, monitor customer behavior from the initial contact to conversion, and demonstrate which marketing efforts truly produce results … all while complying with strict data privacy laws. Today on the Banking Transformed podcast, we're tackling these issues with Harmon Lyons, Vice President of Strategy and Market Development at TransUnion. We'll discuss full-funnel marketing strategies for financial services that blend brand awareness with acquisition tactics, achieving up to 40% improvements in identity completion. This allows banks and credit unions to finally demonstrate ROI and link marketing efforts directly to conversions. If you're a financial services marketer facing customer data fragmentation, attribution challenges, or privacy compliance concerns, this episode offers actionable strategies for enhancing campaign performance in 2025. This episode of Banking Transformed is sponsored by TransUnion TransUnion brings clarity to marketing chaos by delivering a 360-degree view of your customer, helping you deepen your insights, accelerate your decision making, and better measure the impact of every marketing dollar. For more information: Bring Clarity to Chaos | TransUnion
Everywhere you turn, someone's trying to fake something like an image, a voice, or even an entire identity. With AI tools now in almost anyone's hands, it takes minutes, not days, to create a convincing fake. That's changed the game for both sides. The fraudsters have new weapons, and the rest of us are scrambling to keep up. The real question now isn't just how to stop scams, but how to know who or what to trust online. My guest today, Bala Kumar, spends his days on the front lines of that battle. He's the Chief Product and Technology Officer at Jumio, a company working to make digital identity verification faster, smarter, and safer. Bala has more than twenty years in the industry, including leadership roles at TransUnion, and he's seen firsthand how the race between innovation and exploitation never really ends. It just keeps speeding up. In our conversation, Bala shares how generative AI has supercharged the fraud world, what makes identity such a fragile link in digital trust, and why biometrics may finally offer a way forward. We also dig into the psychology behind online risk, how convenience often wins over caution, and what small habits can help people protect themselves in an age where deception looks more real than ever. Show Notes: [01:04] Bala Kumar has a background in product management and fraud prevention from TransUnion to Jumio. [01:59] He describes how fraudsters constantly evolve, forcing companies to anticipate attacks instead of just reacting. [03:56] The quality of manipulated images has skyrocketed, making real vs. fake nearly indistinguishable. [05:17] Jumio's systems catch most fake IDs, but Bala admits even advanced systems must keep auditing for missed fraud. [07:16] Regular audits and rapid response cycles help Jumio identify attack spikes within 24–48 hours. [09:40] Generative AI has dramatically increased the speed and volume of fraud attempts across industries. [11:33] Jumio uses cross-transaction risk analysis to detect emerging fraud patterns and shut down attacks quickly. [13:00] Fraudsters move from one platform to another, always searching for weaker defenses and faster wins. [15:10] Bala explains how fraud prevention has expanded beyond banking into gaming, dating, and gig platforms. [16:38] Consumers crave low friction, which ironically makes them more vulnerable to scams. [17:20] Instant gratification culture pressures companies to reduce security steps, fueling greater risk. [19:52] New AI-driven fraud tactics include injected camera feeds and highly realistic deep fakes. [20:12] Old tricks like “send me a selfie with proof” no longer work—deepfakes can now mimic anything. [22:22] Bala sees biometrics as the next major safeguard for digital identity and real-time verification. [23:12] Facial recognition has become mainstream, paving the way for secure and low-friction identity checks. [26:19] Jumio is already deploying biometric check-ins for events and hotel registrations with great success. [27:30] Account recovery and payout systems now use liveness and device checks to confirm identity safely. [30:09] Bala critiques outdated knowledge-based questions like “What's your favorite food?” as unreliable security. [31:12] Consumers lack visibility into which apps use strong verification or multi-factor authentication. [33:56] He calls for an independent rating system to rank apps based on security and identity protection. [37:53] Bala urges users to question why companies ask for personal data like SSNs or ZIP codes. [39:29] Even a ZIP code and last name can expose personal records, highlighting the need for awareness. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jumio Bala Kumar - LinkedIn
Les données volées lors de la fuite massive de données personnelles chez Desjardins en 2019 circulent toujours sur le dark web, soulevant des inquiétudes. Même si le service de surveillance d'Equifax offert est arrivé à échéance, il existe des moyens efficaces pour se protéger contre les vols d'identité. La solution la plus simple et la plus efficace pour éviter les problèmes est de verrouiller son dossier de crédit auprès des deux agences principales: Equifax et TransUnion. Au Québec, ce service de verrouillage est offert gratuitement, un avantage unique au Canada. «Quand on verrouille son dossier de crédit, il n'y a personne qui peut faire un prêt en notre nom, qui peut ouvrir une nouvelle carte de crédit ou s'acheter une auto», explique Marie-Eve Fournier. Autre sujet abordé Lutte contre la fraude: Ottawa annonce une nouvelle agence. Voir https://www.cogecomedia.com/vie-privee pour notre politique de vie privée
How's your credit score? Is it in tip-top shape, or maybe it could use a little bit of love? The fact is that your credit score is one of the most important financial metrics we use today and how we manage and nurture it makes a huge difference in shaping your financial opportunities. By managing and improving it, you can secure better loan terms and lower interest rates, paving the way for a healthier financial future. Links: Explore the identity protecting benefits of a Better Checking account Disputing Errors on Your Credit Reports | Consumer Advice Check out TCU University for financial education tips and resources! Follow us on Facebook, Instagram and Twitter! Learn more about Triangle Credit Union Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. A credit score might seem like a mysterious three-digit number, but it holds significant influence over your financial life. Whether you're applying for a loan or a credit card, renting an apartment, or even setting up utilities, your credit score plays a crucial role in the decisions that lenders, landlords, and service providers make. Your credit is a valuable asset, and credit score awareness can be a crucial piece in overall financial wellness and identity theft protection. In this tip, we want to remind account holders of the importance of understanding credit scores and provide some tips to help them improve and maintain a healthy credit score. What Is a Credit Score? Simply put, a credit score is like a grade for how good you are at managing money. It is one of the most important tools that lenders and financial institutions use to assess the risk of lending money to you. A higher credit score indicates a healthy credit history; therefore, a lower credit risk, making you more appealing to potential creditors. Credit scores typically range from 300 to 850, with higher scores being better, indicating that you have consistently made payments on time to satisfy your credit obligations. While a "good" credit score varies based on the lender and the specifics of the loan request, it is typically around 700 or higher. Once your score is over 760, you may expect to be offered the best available rates. Credit agencies refresh scores once a month, but the exact timing of those updates may vary based on a myriad of factors. How Is a Credit Score Calculated? You might be surprised to learn that you can have multiple different credit scores at the same time. Based on where the lender obtained their data (from one, two, or all three credit reporting agencies), the credit score model that is used, the lender's own criteria for issuing credit, and the timing of when the score was produced. A hypothetical scenario for calculating a credit score might weigh the following factors this way: Payment History (35%): This is the most important part. It's like getting a gold star for paying bills on time. If you pay on time, your score goes up. If you miss payments, it goes down. Credit Utilization (30%): Imagine you have a money jar, and you use only a little bit of it. That's good for your score. But if you use a lot of it, it's not so good. This measures how much of your available credit you're using. Length of Credit History (15%): The longer you've had credit (like a credit card or loan), the better. It's like experience points. More experience means a higher score. Credit Mix (10%): Having different types of credit, like credit cards and loans, can be like having a diverse team. It's good for your score, but you don't need to have them all. New Credit (10%): Every time you apply for new credit, like a loan or a credit card, it can slightly lower your score. Too many applications at once can hurt your score. Lenders will also look at other factors, such as your income, your assets, or how long you have been at your current job. Note that a high credit score isn't the only sign of financial health. An individual who chooses to use cash or debit cards for major purchases rather than taking out loans will likely have a lower credit score than someone with a long record of multiple well-managed debts, even though they may be very financially responsible. Why Does Your Credit Score Matter? Getting Credit: When you need to borrow money, like for a credit card or a car loan, lenders look at your credit score. If it's high, they're more likely to say yes. Plus, you might get lower interest rates, which means you pay less in the long run. Interest Rates: A good credit score can mean lower interest rates on loans and credit cards. Lower interest rates save you money, so it's a win. Renting a Home: Landlords often check your credit score when you apply to rent an apartment. A good score can help you get the place you want. Utility Bills: Some companies might look at your credit score before deciding if you need to pay a deposit for things like electricity and water. Job Opportunities: Some jobs, especially those handling money, check your credit as part of the hiring process. A good credit score can make you more attractive to employers. For those interested, here are 9 Tips to Improve Your Credit Score Pay Bills on Time: Make sure you pay your bills by their due dates. Set up reminders or automatic payments to help you stay on track. Manage Credit Cards Wisely: Keep your credit card balances low compared to your credit limits. Aim to use less than 30% of your available credit. Pay off your credit card bills in full whenever you can. Mix Different Types of Credit: Having different types of credit, like credit cards, loans, and mortgages, can boost your score. Only open new credit when you really need it. Don't Close Old Accounts: The longer you've had credit, the better. So, avoid closing old credit card accounts, especially if they have high credit limits. Deal with Problems: If you have late payments or debts in collections on your credit report, work on fixing them. Pay off debts in collections and ask creditors to remove them, if possible. Ask for a Credit Limit Increase: If you've been good at paying your credit card bills, consider asking for a higher credit limit. Having a higher credit limit could reduce your total credit utilization, which can help your credit score. Be Careful with New Credit Inquiries and Too Many New Accounts: Every time you apply for new credit, it leaves a mark on your credit report. Too many marks can hurt your score, so be careful about applying for credit often. Likewise, opening lots of new credit accounts in a short time can worry lenders and lower your score. Only open new accounts when you need them. Check Your Credit Report Regularly: Dispute any errors you find in writing to all three credit bureaus. You'll want to include the credit bureau's dispute form as well as any supporting documentation and be sure to keep copies of everything you send. You can find sample letters and more information about how to file a credit dispute in an article from the Federal Trade Commission (link will be in the show notes.) Stay Alert for Signs of Identity Theft: All the work you do to improve your credit score could be thwarted by someone who has stolen your personal identifying information to take out loans in your name. Review your credit report and watch for any signs of identity theft to ensure your credit score is impacted by only your own financial behavior. If you find evidence of identity fraud in your credit report, remember, we can help. Members with a Triangle Better Checking account with IDProtect, have access to Identity Theft Resolution Advocates who are standing by to dispute fraudulent activity that might damage their credit standing. Build a Credit Score Without Debt Young adults and those who have never had a need for credit may not want to go into debt but want to build their credit score. Here are a couple of ways that you can build your credit score without debt. Apply for a credit-builder loan, which places the money you borrow into a certificate of deposit (CD) or savings account that you can claim after making 12 monthly payments. Apply for a secured credit card, which gives you a line of credit that is backed by a cash deposit. Remember, with your Better Checking account, you are entitled to receive convenient access to your TransUnion® credit score monthly. Your score is tracked on a timeline to help identify unexpected changes in your score's movement that could indicate identity theft. Plus, with a Better Checking account, you have access to your annual credit report. Visit our Better Checking dedicated site to access your benefits of download the TCU Better Checking app for convenient access on the go. If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page and look for our sponsor, Triangle Credit Union on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday and check out our other tips and episodes on the Making Money Personal podcast. Have a great day!
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the security implications of WhatsApp, the challenges of age verification laws, the recent TransUnion data breach, and the significant cyber attack on Jaguar Land Rover. They emphasize the importance of strong cybersecurity measures, the risks associated with third-party data management, and the need for businesses to invest in cybersecurity to protect against potential breaches and their cascading effects on supply chains.----------------------------------------------------YouTube Video Link: https://youtu.be/Z-StvCprzjE----------------------------------------------------Documentation:https://www.fastcompany.com/91357825/whatsapp-banned-capitol-hill-how-secure-meta-messaging-encryptedhttps://arstechnica.com/security/2025/10/discord-says-hackers-stole-government-ids-of-70000-users/https://www.msn.com/en-us/money/other/transunion-hack-has-put-44-million-americans-personal-data-at-risk-including-social-security-how-to-protect-yourself-before-it-s-too-late/ar-AA1OhP12https://www.msn.com/en-us/news/world/fears-putin-backed-hackers-are-behind-cyber-attack-on-jaguar-land-rover/ar-AA1OiZnzhttps://cybersecuritynews.com/jaguar-land-rover-breached-by-hellcat/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
And I Quote: Building Relationships with Insurance Agents and Small Business Owners
It's Cybersecurity Awareness Month and we invite insurance agents to listen to this episode to get their small business clients prepared.In this episode, Ashleigh Burden and Eder Ribeiro discuss the critical importance of cybersecurity and cyber insurance for small businesses. They explore common misconceptions about small business security, the impact of cyber incidents, and the necessity of having adequate cyber insurance coverage. Eder shares insights from his extensive experience in incident response and emphasizes the need for small businesses to take cybersecurity seriously. The conversation also touches on the evolving regulatory landscape and the partnership between Coterie and TransUnion to make cyber insurance more accessible for small businesses.Learn more about TransUnion: https://www.transunion.com/lp/cyberscout-explainerlinkedin.com/company/transunionLearn more about Coterie Insurance:https://coterieinsurance.com/insurance/cyber-insurance-for-small-businesses/https://coterieinsurance.com/blog/5-reasons-your-clients-need-cyber-insurance/Timeline: 00:00 - 01:54: Introductions01:54 - 04:42: The Myth of Small Business Security04:42 - 06:36: Common Cyber Attack Vectors for Small Businesses06:36 - 09:59: Impact of Cyber Incidents on Small Businesses09:59 - 12:06: Trends for Agents and Brokers in Cyber Insurance12:06 - 13:53: Regulatory Landscape for Small Businesses13:53 - 16:49: Making Cyber Insurance Accessible16:49 - 18:59: Understanding Cyber Insurance Coverage18:59 - 23:03: Key Takeaways for Cybersecurity Awareness Monthcybersecurity, cyber insurance, small business, cyber attacks, incident response, insurance agents, regulatory compliance, risk management, TransUnion, Coterie
In this episode of Extra Credit, Harmon Lyons, VP of Strategy and Market Development for TransUnion's financial services marketing solutions, joins Craig and Josh for a deep dive into the evolving role of data in financial services marketing. Harmon shares insights from nearly 30 years in the industry, highlighting how all FS marketers — from regional credit unions to national banks — can overcome fragmentation, connect with customers across channels and prove ROI. The conversation covers best practices for identity resolution, the importance of brand building — even on modest budgets — and how to balance acquisition and retention strategies. Whether you're a CMO or in a marketing-adjacent role, this episode offers a practical look at how data-driven strategies are reshaping the way financial institutions engage with consumers. The information discussed in this podcast constitutes the opinion of TransUnion, and TransUnion shall have no liablity for any actions taken based upon the content of this podcast.
Back in the early 1900s, the Chicago mafia was known as “The Outfit”, and their frontman was a Harvard-educated lawyer named Abe Pritzker, a man once described as the “clean face of a dirty business”. Out of this situation, Abe Pritzker was able to build a massive empire of businesses, and from there his family built upon his foundation over the next century to create a fortune exceeding $33 billion. These days the Pritzker family is responsible for financing the Rainbow Mafia & Trans Agenda, Barack Obama's rise to power, the Diversity Equity Inclusion push, the Trans-Pacific Partnership, and other agendas designed to subvert America from within. From owning the Hyatt Hotel brand & Royal Caribbean cruise line to the TransUnion credit reporting agency & Marmon Group, the Pritzker family runs Chicago and has installed one of their own as governor of the state of Illinois, but there are now some rather obvious cracks in the foundation. The Octopus of Global Control Audiobook: https://amzn.to/3xu0rMm Hypocrazy Audiobook: https://amzn.to/4aogwms Website: www.Macroaggressions.io Activist Post: www.activistpost.com Sponsors: Chemical Free Body: https://www.chemicalfreebody.com Promo Code: MACRO C60 Purple Power: https://c60purplepower.com/ Promo Code: MACRO Wise Wolf Gold & Silver: www.Macroaggressions.gold LegalShield: www.DontGetPushedAround.com EMP Shield: www.EMPShield.com Promo Code: MACROChristian Yordanov's Health Program: www.livelongerformula.com/macro Above Phone: abovephone.com/macro Promo Code: MACRO Van Man: https://vanman.shop/?ref=MACRO Promo Code: MACRO Activist Post: www.ActivistPost.com Natural Blaze: www.NaturalBlaze.com Link Tree: https://linktr.ee/macroaggressionspodcast
TransUnion se jongste Consumer Pulse-studie toon 'n vlaag van optimisme oor die ekonomie onder Namibiërs, met 71 persent wat sê dat hulle hoopvol voel oor die jaar wat voorlê, en 78 persent wat 'n inkomsteverhoging verwag. Ekonoom Gabriel Erastus, wat met Kosmos 94.1 Nuus gepraat het, dring egter aan dat 'n trompetgeskal oor die ekonomie met 'n knippie sout gevat moet word. Hy sê die ekonomie bly skerp verdeeld tussen die formele en informele sektore. Erastus verduidelik.
Namibiese verbruikers verkeer onder toenemende finansiële druk, met inflasie, werkverliese en hoë behuisingskoste hul grootste bekommernisse, volgens TransUnion se jongste Consumer Pulse-studie. Ekonoom Josef Sheehama het aan Kosmos 94.1 Nuus gesê dat 'n mengsel van beleide dringend nodig is, wat wissel van monetêre maatreëls om inflasie te bekamp tot verbeterde behuisingsbekostigbaarheid. Hy het ook gevra vir 'n herstruktureerde SME-herstelskema.
Learn how the Fed rate cut impacts loans and savings, then find out when to freeze your credit and how to do it fast. What does a Federal Reserve rate cut mean for your wallet? Should you freeze your credit if an internet provider runs a soft pull? Hosts Sean Pyles and Elizabeth Ayoola kick off this episode with senior news writer Anna Helhoski to unpack the Federal Open Market Committee's (FOMC) new federal funds rate target range and how it filters through to credit cards, mortgages, auto loans, personal loans, and high-yield savings accounts and CDs. They explain why Fed chair Jerome Powell framed this as a “risk-management cut,” what dissent within the committee signals, how a cooling labor market and sticky inflation shape the outlook for additional cuts, and what stock market moves might follow. Plus, what all of that means for your near-term borrowing and saving decisions. Then, NerdWallet's Amanda Barroso joins Sean and Elizabeth for a practical lesson in credit freeze 101. They start with when and why to freeze your credit, with tips on freezing at all three bureaus, using apps for fast thawing, and setting time-boxed thaws before major credit applications. They also discuss soft vs. hard inquiries, fraud alerts vs. credit freezes vs. credit locks, and common pitfalls (forgetting one bureau, thawing too late at the car dealership, weak passwords) to help you understand when to keep your reports “frozen like Elsa,” but still move fast when you need new credit. Fed Trims Rate: What Does It Mean For You? https://www.nerdwallet.com/article/finance/fed-rate-cut-sept-2025 How to Unfreeze Your Credit With Equifax, Experian and TransUnion https://www.nerdwallet.com/article/finance/how-to-unfreeze-your-credit Want us to review your budget? Fill out this form — completely anonymously if you want — and we might feature your budget in a future segment! https://docs.google.com/forms/d/e/1FAIpQLScK53yAufsc4v5UpghhVfxtk2MoyooHzlSIRBnRxUPl3hKBig/viewform?usp=header In their conversation, the Nerds discuss: credit card APR, mortgage refinance rates, savings account interest rates, certificate of deposit rates, stock market after Fed decision, inflation forecast, unemployment trends, federal funds rate explained, Trump pressure on Fed, dissent at FOMC, labor market cooling, tariffs and inflation, soft credit check vs hard credit check, how to unfreeze credit, thaw credit timeline, fraud alert vs credit freeze, credit lock vs credit freeze, identity theft protection steps, FTC identity theft reports, data breach protection, certified mail credit freeze, password manager for credit bureaus, how to freeze credit by phone, and credit freeze pitfalls. To send the Nerds your money questions, call or text the Nerd hotline at 901-730-6373 or email podcast@nerdwallet.com. Like what you hear? Please leave us a review and tell a friend. Learn more about your ad choices. Visit megaphone.fm/adchoices
Your credit score impacts nearly every financial decision—car loans, mortgages, even job opportunities. In this episode of the MX3 Podcast, we dive deep into what a credit score really is, how it's calculated, and why it's more important than ever in today's economy.We break down the role of payment history, credit utilization, and the impact of debt. You'll learn surprising stats from TransUnion, strategies to manage your score, and how banks view you when you apply for credit. Join us as we explore the truth about living with credit in 2025 and beyond. Don't miss out on the insights that could save you thousands.
En ESTO NO TIENE NOMBRE, analizamos la economía dominicana con Danilda Almánzar, de TransUnion. Revelamos los sorprendentes hallazgos del estudio Consumer Pulse 2025, que muestra un gran optimismo financiero en la población, especialmente entre Millennials y Generación Z. Descubre las tendencias de consumo, el aumento esperado de ingresos y lo que realmente piensan los consumidores sobre su futuro económico.
Tech News and Commentary Dave and Chris discuss Apple’s new iPhones, Watches, and Air Pods, Ai voice translation for Instagram Reels, a TransUnion data breach, Samsung’s upcoming devices, and more. “News Pick of the Week” with Ralph Bond We've all heard about the huge challenge of creating habitats with air, water, and food sources to […]
The latest installment of Extra Credit has Dawn Figlioli, VP of Sales, Financial Services at TransUnion, stepping into the host seat, guiding a conversation with Craig and Josh on the latest credit market insights. The trio explores the current lending environment, marked by both stability and caution, and dives into the surprising growth at both ends of the credit spectrum. They discuss rising delinquencies in auto and mortgage, the evolving role of FinTechs in super prime lending, and how refined risk strategies are reshaping subprime performance. The episode also touches on the regulatory landscape and why consumer optimism may be on the rise — despite economic headwinds. Whether you're a lender navigating uncertainty or a strategist looking for signals in the noise, this episode offers grounded, data-driven perspective on what's next. The information discussed in this podcast constitutes the opinion of TransUnion, and TransUnion shall have no liablity for any actions taken based upon the content of this podcast.
Fraudology is presented by Sardine. Get your tickets to Sardine[Con] and end the scamedmicThis episode of Fraudology returns with a comprehensive fraud news roundup, as host Karisse Hendrick examines major cybersecurity incidents and emerging scam tactics. This episode offers an in-depth look at the Salesforce data breach that impacted hundreds of organizations, including credit bureau TransUnion. Carice breaks down how hackers exploited a third-party tool to steal sensitive data and credentials from Salesforce instances. She also unpacks the PayPal fraud detection failure that sent European banks into panic mode, freezing billions in transactions. The episode shines a light on the dark world of human trafficking and scam compounds in Southeast Asia, revealing new connections to sextortion schemes targeting minors. Carice shares eye-opening details about these criminal operations and their expanding reach. The rise of AI-powered fraud takes center stage as well, with Carice examining how deepfakes and other AI tools are being weaponized by scammers to impersonate executives and create convincing fake websites. She offers practical advice for protecting yourself and your business from these evolving threats. With expert insights and analysis of the latest fraud trends, this episode is a must-listen for anyone looking to stay ahead of cybercriminals and scammers. Don't miss this essential update on the state of fraud, tune in now to arm yourself with knowledge.Fraudology is hosted by Karisse Hendrick, a fraud fighter with decades of experience advising hundreds of the biggest ecommerce companies in the world on fraud, chargebacks, and other forms of abuse impacting a company's bottom line. Connect with her on LinkedIn She brings her experience, expertise, and extensive network of experts to this podcast weekly, on Tuesdays.
In this episode of The Personal Finance Podcast, Andrew answers eight questions on tax strategies and retirement planning, covering when investment moves trigger taxes (depends on account type), tax loss harvesting for high earners, why the 75-80% retirement income rule uses pre-tax numbers but you should plan more conservatively, strategic Roth 401k timing in lower tax brackets, a TransUnion data breach affecting 4.4 million Americans, income thresholds where traditional 401ks beat Roth options (24-30% marginal rates), saving for kids' expenses using the five-year investment rule, emergency fund storage as rates drop, and comprehensive pension planning beyond just relying on guaranteed payments. Today we are going to answer these questions: Do you get taxed when moving money from one investment to another inside the same account? How does tax-loss harvesting work? Most retirement rules I've seen state that you want 75 to 80% of your pre-retirement income. Is that before or after taxes? Should you max out a Roth 401(k) in the first quarter of the year because of the lower marginal tax rate? At what annual income should someone avoid a Roth 401(k) and do traditional for tax purposes? Putting money away for kids' wedding, cars, etc.—for when they get older. HYSA or brokerage? What are the best high-yield ways to store an emergency fund? How to plan for retirement with a pension? How Andrew Can Help You: Listen to The Business Show here. Don't let another year pass by without making significant strides toward your dreams. "Master Your Money Goals" is your pathway to a future where your aspirations are not just wishes but realities. Enroll now and make this year count! Join The Master Money Newsletter where you will become smarter with your money in 5 minutes or less per week Here! Learn to invest by joining Index Fund Pro! This is Andrew's course teaching you how to invest! Watch The Master Money Youtube Channel! , Ask Andrew a question on Instagram or TikTok Learn how to get out of Debt by joining our Free Course Leave Feedback or Episode Requests here. Car buying Calculator here Thanks to Our Amazing Sponsors for supporting The Personal Finance Podcast Shopify: Shopify makes it so easy to sell. Sign up for a one-dollar-per-month trial period at shopify.com/pfp Thanks to Policy Genius for Sponsoring the show! Go to policygenius.com to get your free life insurance quote. Indeed: Start hiring NOW with a SEVENTY-FIVE DOLLAR SPONSORED JOB CREDIT to upgrade your job post at Indeed.com/personalfinance Go to https://joindeleteme.com/PFP20/ for 20% off! Shop outdoor furniture, grills, lawn games, and WAY more for WAY less. Head to wayfair.com Get 50% Off Monarch Money, the all-in-one financial tool at www.monarchmoney.com/PFP Chime: Start your credit journey with Chime. Sign-up takes only two minutes and doesn't affect your credit score. Get started at chime.com/ Acorns: Start investing automatically with Acorns and get a $5 bonus at Acorns.com/PFP Go to https://joindeleteme.com/PFP20/ and Use Promo Code PFP for 20% off! Links Mentioned in This Episode: tax loss harvesting, Connect With Andrew on Social Media: Instagram TikTok Twitter Master Money Website Master Money Youtube Channel Free Guides: The Stairway to Wealth: The Order of Operations for your Money How to Negotiate Your Salary The 75 Day Money Challenge Get out Of Debt Fast Take the Money Personality Quiz Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvSecurity models can be one of the most challenging concepts for CISSP candidates to grasp, yet they form the bedrock of how we implement and understand security controls. In this comprehensive episode, we break down Domain 3.2's security models in plain, accessible language with real-world examples that will finally make these abstract concepts click.We start with an analysis of the recent TransUnion data breach affecting 4.4 million individuals, using it as a practical reminder of why proper security architecture matters. This breach, occurring through a third-party application, perfectly illustrates the dangers when security models aren't properly implemented.The episode then demystifies the Trusted Computing Base (TCB), explaining its role as the foundation of creating secure code. We explore key components including the Security Kernel, Reference Monitor, Trusted Path, and TCB Boundary, translating these complex concepts into understandable terms.The heart of the episode focuses on the "Big Eight" security models you need to know for the CISSP exam. From Bell-LaPadula's "no read up, no write down" confidentiality focus to Biba's integrity-centered approach, we provide clear explanations and memorable scenarios for each model. You'll learn how Clark-Wilson enforces business integrity through separation of duties, how Brewer-Nash prevents conflicts of interest, and how the remaining models address specific security concerns.Rather than simply memorizing names and concepts, this episode gives you a framework for understanding each model's purpose, category (confidentiality, integrity, information flow, or access), and practical application. We conclude with exam preparation tips, highlighting which models deserve the most attention during your studies.Whether you're preparing for the CISSP exam or simply want to deepen your cybersecurity knowledge, this episode transforms abstract security models into practical tools you can apply to real-world security challenges. Visit CISSPCyberTraining.com for free questions and additional resources to support your certification journey.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Ein verhalten freundlicher Start in die Woche. Da die FED so oder so am 17. September die Zinsen senken wird, hat die Sorge vor möglicherweise heißen Erzeuger- und Verbraucherpreise am Mittwoch und Donnerstag nachgelassen. Weil AppLovin und Robinhood in den S&P 500 aufgenommen werden, sehen wir bei diesen Werten deutliche Kursgewinne. Außerdem werden Nutanix und TransUnion in den S&P Mid-Cap 400 Index aufgenommen. Die Citigroup bleibt bei NVIDIA zwar bei der Kaufempfehlung, senkt wegen des zunehmenden Wettbewerbs durch andere KI-Chiphersteller das Kursziel von $220 auf $210. Das Management von Broadcom hat letzte Woche signalisiert, dass ein vierter Großkunde gewonnen wurde. Medienberichten zur Folge handelt es sich um Open AI. Abonniere den Podcast, um keine Folge zu verpassen! ____ Folge uns, um auf dem Laufenden zu bleiben: • X: http://fal.cn/SQtwitter • LinkedIn: http://fal.cn/SQlinkedin • Instagram: http://fal.cn/SQInstagram
Ein verhalten freundlicher Start in die Woche. Da die FED so oder so am 17. September die Zinsen senken wird, hat die Sorge vor möglicherweise heißen Erzeuger- und Verbraucherpreise am Mittwoch und Donnerstag nachgelassen. Weil AppLovin und Robinhood in den S&P 500 aufgenommen werden, sehen wir bei diesen Werten deutliche Kursgewinne. Außerdem werden Nutanix und TransUnion in den S&P Mid-Cap 400 Index aufgenommen. Die Citigroup bleibt bei NVIDIA zwar bei der Kaufempfehlung, senkt wegen des zunehmenden Wettbewerbs durch andere KI-Chiphersteller das Kursziel von $220 auf $210. Das Management von Broadcom hat letzte Woche signalisiert, dass ein vierter Großkunde gewonnen wurde. Medienberichten zur Folge handelt es sich um Open AI. Ein Podcast - featured by Handelsblatt. +++EXKLUSIVER NordVPN Deal ➼ https://nordvpn.com/Wallstreet Jetzt risikofrei testen mit einer 30-Tage-Geld-zurück-Garantie!+++ +++ Individuell, aktiv und ausgezeichnet: Die Vermögensverwaltung von DJE – mehr unter https://www.dje.de/vv +++ +++ Alle Rabattcodes und Infos zu unseren Werbepartnern findet ihr hier: https://linktr.ee/wallstreet_podcast +++ Der Podcast wird vermarktet durch die Ad Alliance. Die allgemeinen Datenschutzrichtlinien der Ad Alliance finden Sie unter https://datenschutz.ad-alliance.de/podcast.html Die Ad Alliance verarbeitet im Zusammenhang mit dem Angebot die Podcasts-Daten. Wenn Sie der automatischen Übermittlung der Daten widersprechen wollen, klicken Sie hier: https://datenschutz.ad-alliance.de/podcast.html Impressum: https://www.360wallstreet.de/impressum
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — It's 8ft skeleton season.02:18 - BHIS - Talkin' Bout [infosec] News 2025-09-0203:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets'13:46 - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling17:44 - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K19:39 - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we're working through it.'20:56 - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 202522:43 - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-842425:20 - Story # 8: First known AI-powered ransomware uncovered by ESET Research30:00 - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception32:06 - Story # 10: TransUnion suffers data breach impacting over 4.4 million people34:17 - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI35:20 - Story # 12: They weren't lovin' it - hacker cracks McDonald's security in quest for free nuggets, and it was apparently not too tricky39:29 - Identify the birds you see or hear with Merlin Bird ID40:04 - Story # 13: Detecting and countering misuse of AI: August 202551:31 - Story # 14: I'm a Stanford student. A Chinese agent tried to recruit me as a spy
This conversation highlights how regulated industries are tackling data challenges, driving customer value, and proving that trust is the new currency in digital transformation.
The digital house of cards continues to collapse as our personal data faces unprecedented vulnerability. This week, we reveal how the Department of Government Efficiency's reckless handling of over 300 million Americans' Social Security numbers could lead to a massive security crisis. After repeatedly warning about these dangers, our predictions are unfortunately coming true - just as we've seen with Taco Bell's embarrassing AI drive-thru experiment.Remember when Microsoft promised Windows 10 would be "the last operating system you'd ever need"? That promise expires October 14th, 2025, when support officially ends. But don't panic - we break down exactly how to secure free extended security updates through 2026 using Microsoft Rewards points. With nearly half of all PC users worldwide still running Windows 10, Microsoft has been forced to create options for those who can't or won't upgrade to Windows 11.The technology failures continue mounting as TransUnion joins Equifax and Experian in the data breach hall of shame. Despite claims of "limited exposure," dark web samples reveal the credit bureau leaked names, addresses, phone numbers, and unredacted Social Security numbers for 4.4 million Americans. When all three major credit reporting agencies have been compromised, who can we trust with our most sensitive information?Our Two Truths and a Lie segment challenges listeners to separate fact from fiction in today's outlandish tech landscape, while Mike's Mesmerizing Moment examines why the constant pursuit of new technology doesn't actually make us happier. We also take a nostalgic journey back to 1977 when Pioneer 11 made history as the first human-made object to fly past Saturn.Grab your favorite whiskey and join us as we navigate this technological minefield together. Whether you're concerned about your digital privacy, struggling with Windows upgrade decisions, or just want to hear which bourbon earned our unanimous approval this week, Tech Time Radio delivers the insights you need with the humor that makes complex tech digestible.Support the show
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
Google officially released Gemini 2.5 this week, with possibly the best AI name yet, Nano Banana. Many are saying this is now the top dog for image generation and spells the end for Photoshop. At the other end of the spectrum, Taco Bell is rethinking its AI ordering in the drive-thru. Plus, we get you caught up on the rest of the week's tech news. All so you can get out there and tech better. Watch on YouTube! - Notnerd.com and Notpicks.com INTRO (00:00) Mr. Beast Team Water (03:15) Apple Event - September 9th, 2025 (05:35) MAIN TOPIC: Nano Banana (06:30) Google improves Gemini AI image editing with “nano banana” model 10 crazy Nano Banana AI image use cases that will blow your mind Google's official Nano Banana prompt guide Image editing in Gemini just got a major upgrade DAVE'S PRO-TIP OF THE WEEK: Use built-in translation app as a foreign dictionary (13:55) JUST THE HEADLINES: (18:00) Florida deploys robot rabbits to control invasive Burmese python population Scientists unlock secret to thick, stable beer foams Rare snail has a 1-in-40,000 chance of finding a mate. New Zealand begins the search Your Word documents will be saved to the cloud automatically on Windows going forward World's first 1-step method by US-China team turns plastic into fuel at 95% efficiency Humans inhale as much as 68,000 microplastic particles daily, study finds Taylor Swift & Travis Kelce's engagement announcement breaks Instagram record TAKES: Taco Bell rethinks future of voice AI at the drive-thru (22:10) Nothing busted using professional photos as Phone 3 samples (24:10) Denmark to tackle deepfakes by giving people copyright to their own features (27:55) TransUnion says hackers stole 4.4 million customers' personal information (31:10) BONUS ODD TAKE: Snapshots of Kids Bike Jumping in the 1970s (33:35) PICKS OF THE WEEK: Dave: DuoLingo - freemium (37:20) Nate: 2 Pack Anker USB C Charger with Foldable Plug, 20W USB C Charger Block for iPhone 16/15 and More Series, Galaxy, Pixel, iPad (Cable Not Included) (45:00) RAMAZON PURCHASE OF THE WEEK (49:40)
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a look at how far we've come (and how vulnerable we still are). A look back at issue #1 of BYTE magazine exactly 50 years ago The enforcement of the SHAKEN & STIR Telecom protocols Breaking: Judge rules against forced Google divestitures in monopoly case The inherent danger of consolidating authentication Can AI be controlled? Vivaldi says a big "no" to AI-enhanced web browsers How WhatsApp figured into Apple's recent 0-day attacks Leveraging AI as an attack aid The latest TransUnion data breach Two scummy websites sue the UK over age requirements OpenSSH reminds its users to adopt post-quantum crypto The DOD uses open source maintained by a Russian national Much great feedback from our terrific listeners Sci-Fi news from "The Frontiers Saga" Ryk Brown Show Notes - https://www.grc.com/sn/sn-1041-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit threatlocker.com/twit bitwarden.com/twit bigid.com/securitynow joindeleteme.com/twit promo code TWIT
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Google, Transunion, Farmer's Insurance and even DOGE are part of this week's mess.
Transunion data breached caused by Salesforce Breach, AI being used to hack companies, AI being used to help people kill themselves now OpenAI is getting Sued!, Microsoft forcing saving in the Cloud, Should I update Win10 or just keep using it? Employee placed a killswitch on employers system and was fired, Use NotebookLM to figure out what Microsoft ULA is asking you to agree to.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
If you like what you hear, please subscribe, leave us a review and tell a friend!
i'm wall-e, welcoming you to today's tech briefing for friday, august 29. here's what's making headlines: commonwealth fusion systems' major funding: the massachusetts-based startup secures $863 million from big names like nvidia and google, pushing total funding to nearly $3 billion. the focus is to accelerate its prototype reactor, sparc, aiming for scientific breakeven by 2027, with plans for a commercial reactor by 2028. transunion data breach: a breach affecting 4.4 million customers via a third-party application. personal data including names, birthdates, and social security numbers were accessed, though no credit information was compromised. mark cuban's healthcare disruption: cuban's cost plus drugs initiative aims to tackle the $5 trillion industry with transparent pricing and a new robotic manufacturing plant to address drug shortages and reduce costs. anthropic's ai data policy update: users have until september 28 to opt in or out of having their chat data used for ai training. data retention could last up to five years, reflecting industry trends for improving ai models. expansion of mathgpt.ai: the 'cheat-proof' tutor is expanding to over 50 colleges, enhancing learning through inquiry-based methods with plans for more features and a potential mobile app launch. that's all for today. we'll see you back here tomorrow!
Today on CarEdge Live, Ray and Zach discuss the latest data from TransUnion. THIS IS NUTS! Tune in to learn more.
In this episode, Vadim takes a wide-angle look at U.S. household finances, combining the latest TransUnion credit trends with the Federal Reserve's Distribution of Financial Accounts ("DFA"). He unpacks how early 2024's spike in delinquencies has given way to broad improvement, why certain regions like Utah, DC, and Texas are worth watching, and what's really behind shifts in credit card balances and limits. Vadim also examines the Fed's puzzling real estate valuations, the migration from bank deposits to higher-yield assets, and the stark gap between consumer sentiment and near-record highs in net worth and income.Subscribe to our free research to stay up-to-date on the latest trends. Contact sales@dv01.co to learn how dv01 data can help you understand what's going on in the market, and to better analyze your whole loan portfolio and securitizations.
Satyan Merchant, who is senior vice president and auto and mortgage business leader at TransUnion, made another appearance on the Auto Remarketing Podcast. This time, the focus of the conversation is opportunities for auto refinancing. TransUnion indicated approximately 18 million are considered “in-the-money” for refinancing.
Learn how to dodge scams to protect your money, then understand how to compare robo vs. traditional investment risks. What should you do if your credit card is compromised in a scam? Are robo-advisors riskier than traditional brokerage accounts? Hosts Sean Pyles and Elizabeth Ayoola discuss how to spot and respond to identity theft and dig into how robo-advisors stack up to traditional investing platforms to help you protect your financial life. They kick off Smart Money's new Scam Stories series by welcoming guest Scramble Hughes, a circus performer and scam victim, who shares a real-life experience with credit card fraud. They discuss tips and tricks on recognizing red flags like mass spam messages, acting fast by calling the number on your card (not clicking links), and filing credit freezes with all three credit bureaus. Then, investing Nerd Bella Avila joins Sean and Elizabeth to discuss how robo-advisors compare to traditional brokerage accounts. They discuss risk levels in automated portfolios, SIPC insurance protections, and key factors to consider when choosing a platform like account minimums, platform stability, and user experience. See NerdWallet's top picks for the best robo-advisors of 2025 here: https://www.nerdwallet.com/best/investing/robo-advisors Want us to review your budget? Fill out this form — completely anonymously if you want — and we might feature your budget in a future segment! https://docs.google.com/forms/d/e/1FAIpQLScK53yAufsc4v5UpghhVfxtk2MoyooHzlSIRBnRxUPl3hKBig/viewform?usp=header In their conversation, the Nerds discuss: credit card fraud, how to report identity theft, robo advisor vs brokerage account, SIPC insurance limits, credit freeze Experian, how to freeze your credit, credit card scams TikTok, how to know if a text is a scam, what is a robo advisor, tax loss harvesting robo advisor, ETF risk robo advisor, ETF diversification, FDIC vs SIPC, how to block spam texts, freeze credit TransUnion, safest robo advisors 2025, best robo advisor for ETFs, hacked credit card reader, RFID credit card theft, how to recover from identity theft, difference between SIPC and FDIC, scams targeting small business owners, how to secure your investment accounts, how to protect credit card information, email spam after identity theft, what to do after credit card theft, how long do fraud refunds take, when to freeze credit, best practices after identity theft, and comparing investment platform safety. To send the Nerds your money questions, call or text the Nerd hotline at 901-730-6373 or email podcast@nerdwallet.com. Like what you hear? Please leave us a review and tell a friend. Learn more about your ad choices. Visit megaphone.fm/adchoices
“We know that our old self was crucified with him in order that the body of sin might be brought to nothing, so that we would no longer be enslaved to sin.” - Romans 6:6Being born again in Christ changes a person. We're given a new nature that fights against our old, corrupt nature. Sometimes, the evidence of this is in the area of finances. Straight ahead—a journey to faithful stewardship.Bobby's TestimonyIt's always a great privilege to connect with people, answer their financial questions, and offer help whenever possible. Recently, we spoke with Bobby from Nebraska, whose story is a powerful testament to the transformative power of faith and determination.Bobby was in a tough spot. He had accumulated significant debt, including a car repossession, delinquent medical and credit card debt, and unpaid overdraft loans sent to collections. However, despite his financial struggles, Bobby was determined to turn his life around. When asked if anything had changed in his life since accumulating that debt, Bobby shared his story.In his own words, Bobby explained, “Back then, I was big into partying and addicted to drugs. I sold drugs and went to prison for it. Well, now I'm clean and sober. I don't do any of that anymore. I actually have money in my bank account. September 10th, 2021, was the biggest start of it. That's when I gave my life to Jesus Christ. And now I'm just trying to get everything back in line and where it needs to be.”Hearing about Bobby's life change since inviting Christ into his life as his Savior was truly inspiring. His commitment to sobriety and financial stewardship is a powerful example of God's redemptive power.Steps Toward Financial FreedomA few weeks ago, we advised Bobby to take several steps to get his finances in order. First, we recommended that he pull copies of his credit reports from Experian, Equifax, and TransUnion to identify all his debts. Then, we suggested he contact Christian Credit Counselors to help manage his credit card debt through a debt management plan, which would consolidate his payments and help him pay off his debt faster.We also offered to connect Bobby with one of our Certified Christian Financial Counselors (CertCFC) at no charge. This counselor would work with him one-on-one to develop a budget and create a plan for paying off his old debts. Finally, we took a moment to pray with Bobby, thanking God for His miraculous intervention and the gift of eternal life that Bobby had received.Biblical Principles Guiding Bobby's TransformationBobby's journey highlights several biblical principles that are now guiding his life:The Body as a Temple: Bobby's decision to give up drugs aligns with 1 Corinthians 6:19, which reminds us that our bodies are temples of the Holy Spirit. Recognizing that we are not our own but belong to God is a powerful motivator for making healthy choices. Humility: Bobby's willingness to seek help, even on a public platform, reflects the humility described in Proverbs 22:4: “The reward for humility and fear of the Lord is riches and honor and life.” Honesty: Bobby's commitment to owning up to his debt is a reflection of the biblical principle of honesty. Exodus 20:16 and Colossians 3:9 teach us the importance of living truthfully, especially as followers of Christ. Repaying Debts: The Bible emphasizes the importance of repaying our debts. Psalm 37:21 says, “The wicked borrows but does not pay back, but the righteous is generous and gives.” Bobby's desire to pay off his debt is a step toward fulfilling this principle. Stewardship: The most significant principle guiding Bobby now is stewardship. He wants to manage his finances faithfully, in line with 1 Corinthians 4:2: “It is required of stewards that they be found faithful.”We were grateful to help Bobby on his journey to faithful stewardship, and we want to extend that same help to you. If you're struggling with your finances, need help creating a budget, or want to develop a plan to pay down debt and start saving, please don't hesitate to reach out to us. We're here to help you take the next step toward financial freedom and faithful stewardship.Bobby's story is a powerful reminder that with God's help, it's never too late to turn your life around and get back on track. If you're ready to take that step, we're here to walk alongside you.On Today's Program, Rob Answers Listener Questions:I'm a 60-year-old single retiree, and honestly, I feel financially illiterate. I have two annuity accounts, but I don't fully understand how they work. Should I stay in them or look at other options? I'd appreciate some guidance on how to manage my limited savings wisely.I'm single and trying to plan ahead to create passive income for my future family. I'm debating between buying a rental property and investing in the stock market. Which of these would be the smarter long-term move?My husband and I are retired and considering a reverse mortgage. What's the best way to approach this, and is there a type of reverse mortgage that will ensure we can stay in our home?I loaned money to my cousin, and they repaid me with an extra $300 in interest. Do I need to report that interest as taxable income on my tax return?Can you explain the difference between a Roth IRA and a traditional IRA? Additionally, can someone who is not employed by a company open a 401(k) account?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Movement MortgageHome Equity and Reverse Mortgages: The Cinderella of the Baby Boomer Retirement by Harlan J. AccolaChristian Credit CounselorsWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.
The Friday Five for July 18, 2025: Update on Regulation Banning Medical Debt from Credit Reporting Google Announces NotebookLM Featured Notebooks This week in Apple Rumors Threads Usage Up, Meta Testing Facebook Login 2026 Midwest D-SNP Market Opportunity Get Connected:
In this special roundtable episode of The CMO Podcast, recorded live at the Brand Innovators LVMH Villa, presented by Shutterstock. Jim Stengel sits down with four powerhouse marketing leaders to explore the timeless—and timely—question: What does it take to build a brand people truly love?Joining Jim are...Matt Spiegel, EVP of TruAudience Growth Strategy at TransUnionNicole Parlapiano, Chief Marketing Officer of TubiMelissa Hobley, Chief Marketing Officer of TinderCarole Diarra, Global Vice President of Marketing for UGGTogether, they reflect on the power of going back to brand-building fundamentals, why “the fruit is in the roots,” and how kindness and care can be transformative forces in leadership. This is a conversation full of wisdom, laughter, and straight talk on how to lead brands, and teams, with heart. Whether you're a marketer, creative, or purpose-driven leader, you'll walk away inspired to double down on what really matters.---This week's episode is brought to you by Deloitte, StrawberryFrog and Transunion.Learn more: https://strawberryfrog.com/jimSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Hugo Blankingship III is a highly respected attorney based in Washington, D.C., specializing in identity theft and false credit reporting issues. With over 30 years of experience, he has built a strong reputation for advocating on behalf of consumers who are struggling with inaccurate credit information. His mission is to help clients get incorrect data removed from their credit reports, allowing them to move forward with their financial lives. A graduate of the University of Virginia (B.A., 1982) and the Marshall-Wythe School of Law at the College of William & Mary (J.D., 1986), Hugo began his career as a law clerk to the Honorable Albert V. Bryan, Jr., former chief judge of the U.S. District Court for the Eastern District of Virginia. This foundation shaped his career and led him to become a passionate consumer rights advocate. Throughout his career, Hugo has fought tirelessly against major credit reporting agencies like Experian, TransUnion, and Equifax, ensuring they adhere to the rules. In 2004, he argued the case Nigh v. Koons Buick Pontiac GMC before the U.S. Supreme Court, and has represented clients before the Supreme Court of Virginia and the U.S. Court of Appeals for the Fourth Circuit. Hugo's clients know him as a tenacious attorney who won't back down in the pursuit of justice. Thomas B. Christiano received a B.A. from the University of Virginia in 1993 and a J.D. from the Marshall-Wythe School of Law at the College of William & Mary in 1999. Mr. Christiano has handled numerous consumer protection cases and specializes in cases involving inaccurate credit reporting under the Fair Credit Reporting Act. He has reviewed the credit reporting procedure process from the major credit reporting agencies and the dispute investigation procedures of many banks who have furnished inaccurate credit information. As an experienced credit report lawyer, he can identify the actual damages associated with credit report problems, including emotional distress damages, the loss of employment opportunities, inability to obtain a mortgage, and loss of use of credit., Mr. Christiano also publishes a blog at yourfaircreditreportlawyernow.com, which is an excellent informational resource on the subject. Thomas B. Christiano has decades of experience helping clients who have been the victim of credit fraud and identity theft. Discover how he can help you! During the show we discussed: Common credit report errors and their impact on consumers Effects of identity theft on credit and first steps to take Challenges in disputing false credit report information Overview of the dispute process with credit bureaus How bureaus respond to disputes and what to do if ignored Consumer rights under the Fair Credit Reporting Act (FCRA) Role of Equifax, Experian, and TransUnion in disputes What to do when bureaus don't fix errors and how attorneys help Issues with mixed/merged credit files and how to resolve them Fraud tactics in credit manipulation and identity theft prevention Importance of checking credit reports and common review mistakes Steps to fix credit scores after finding report errors How bad credit affects loans, housing, and employment Benefits of working with a credit report attorney vs. doing it alone Resources: https://www.yourfaircreditlawyer.com/
BOSSes Anne Ganguzza and Tom Dheere, your "real bosses" and co-hosts, connect to dive deep into the critical world of online security and scam prevention for voiceover professionals. They unpack Tom's recent harrowing experience with an AI voice cloning scam, offering a candid look into the crucial insights needed to navigate digital threats and build a truly secure business in today's landscape. Listeners will discover the essential role of vigilance and proactive measures in protecting their assets, gain an understanding of emerging scam tactics, and appreciate the power of community in safeguarding their careers. Anne and Tom also discuss practical pathways for secure transactions and the evolving nature of digital defense. 00:01 - Anne (Host) Hey guys, it's Anne from VO BOSS here. 00:04 - Speaker 2 (Announcement) And it's George the Tech. We're excited to tell you about the VO BOSS. Vip membership, now with even more benefits. 00:10 - Anne (Host) So not only do you get access to exclusive workshops and industry insights, but with our VIP plus tech tier, you'll enjoy specialized tech support from none other than George himself. 00:22 - Speaker 2 (Announcement) You got it. I'll help you tackle all those tricky tech issues so you can focus on what you do best Voice acting. It's tech support tailored for voiceover professionals like you. 00:32 - Anne (Host) Join us guys at VO BOSS and let's make your voiceover career soar. Visit voboss.com slash VIP-membership to sign up today. 00:45 - Speaker 3 (Announcement) It's time to take your business to the next level, the boss level. These are the premier business owner strategies and successes being utilized by the industry's top talent today. Rock your business like a boss, a VO boss. Now let's welcome your host, Anne Ganguzza. Hey, hey, everyone, welcome to the VO BOSS Podcast. 01:04 - Anne (Host) I'm your host, Anne Ganguzza. Hey, hey everyone, welcome to the VO BOSS Podcast. I'm your host, Anne Ganguzza, and I'm here with my real boss, Tom Deere. I had to think about that, Tom. We've been together so long. I was like what is our subtitle here? We are real bosses. 01:20 - Tom (Host) Yeah, we're real bosses. Thanks for having me back, Anne. 01:23 - Anne (Host) How are you doing, Tom, my real boss? Co-host. 01:26 - Tom (Host) All things considered, I'm doing okay, I had a weird experience recently which it seems like a lot of voice actors are experiencing. I got an email from someone expressing interest in wanting to cast me for a voiceover project. Oh yes, I looked at it and it was this long-form project, something like 9,000 and change words. And I looked at it and I'm like and you know I was reading the ins and outs of it and I'm like, huh, like my spider sense was tingling a little bit, but I'm looking at, I'm like this one is worth replying to and getting some information about. 02:00 So there was a little bit of back and forth about it. 02:03 - Anne (Host) So you did reply, and then there was. 02:05 - Tom (Host) There was more conversation. 02:06 - Anne (Host) Yeah, there was more conversation, which is what I always do when I'm trying to find out more information about a job to make sure it's legit. 02:12 - Tom (Host) Right Now, around the same time, maybe a couple of days after that, someone posted on a Facebook group hey, I got this email. It was saying this and this Did anyone else get it? Does it seem legit? And it looked like it was the same email that I had gotten, so I was following that it turns out. 02:28 It was posted by our friend, bridget Real, who is the co-founder of VA for VO, the virtual assistant site that helps voice actors, and we talked about it a little bit and we're both like, yeah, we're going to keep digging a little bit and see what's going on. And then her business partner, lynn, also got the email and I was getting ready to accept it just to see what would happen. And that morning I got a message from her saying hey, did you accept this project? Yet I'm like no, why? And she said because both of us accepted the project. We both got cast for the same exact project. We both got the same exact script. They sent me the script. 03:00 So then I did this. I went to Gemini, google Gemini, which is my AI bot of choice, and I did the prompts. I said you are an expert at detecting scams. Please analyze this script and let me know if you think that this script could be used to harvest a voice actor's voice to clone it. A voice actor's voice to clone it. And it did its analysis and I've got like the 2.5 advanced. So it takes a little time. And it wrote back oh, yes, it does. And here are all the reasons why this, this, this, this, this, this and this. And then I sent that information to Bridget and Lynn and they're like we knew it. We knew it. So then she created a wonderful post on LinkedIn talking about it. And then I wrote a blog with all the information and, like what happened, it was the most read blog I've had in like three years or something like that. 03:52 Yeah, it was crazy. 03:53 - Anne (Host) What's so interesting is it could have been a legit job, like for payment. You would have done it, they would have paid you for it, but they would have used your voice as an AI voice. 04:05 And so therefore, legally right in the end. Right, if you found out later on they could say, oh no, no, no, we paid you. I mean, it was a job that we paid you for and there was no extenuating circumstances or contracts to be signed which, by the way, I'm going to bring up Nava and the AI writer For all your jobs. You should be attaching that AI writer so that your voice is not going to be used as an AI voice, for sure, for sure. 04:37 - Tom (Host) So, to let everybody know, the website was GigLumin G-I-G-L-U-M-I-N. And if you do a Google search of GigLumin and this is what Bridget had figured out is that the website was only a month or two old. And there's these scam websites that you can enter the URL of a website in and it can tell you how likely that's a scam. It checked every red flag, every box, every single box. 04:56 - Anne (Host) So, yes, vo people, bosses, beware, right. So beware of emails. And you know, it's funny because it's lately, just because of the whole AI thing. Anytime I get an email with a job from someone that I don't know, right, that is just out of the blue, that I didn't audition for, where they have large amounts of words, the hairs on the back of my neck kind of stand up and I immediately, immediately check into it. And I think this really warrants a discussion, bosses, because it's very timely that you want to make sure that these jobs are legitimate. So the more research you can do. And I love, Tom Dheere, how you used AI to fight AI Again. 05:37 We had our previous episode on tools that we use. I mean, we are utilizing it as a tool to help us in our day-to-day jobs, and so I think, being aware of possible scams out there, we absolutely have to be, and I'll tell you if it's somebody that I've never heard of and they don't have a signature file. I've gotten to the point where I don't even like and it's not like from a company.com. I don't even literally take it seriously anymore. I don't know about you, Tom, what do you think? 06:05 - Tom (Host) Yes, I'm equally skeptical these days but, I, really like what you said about when you receive the email, check to see if there is a signature at the Tom of it with the company logo, website and contact information. That is one of many red flags and I don't know how much you've noticed lately, Anne, but since I would say about early April, there has been an explosion of scam attempts going on in the voiceover industry. We've had the overpayment scam. That's been going on for at least 10 or 15 years. 06:37 - Anne (Host) Gosh, at least, and bosses. If you haven't heard about it, Tom, let's talk about the overpayment scam for just a minute. Yeah, yeah, Okay so what happens is it's very common. 06:45 - Tom (Host) It's very common. It's been going on for a really long time. So basically they email you and say hey, we've got a project for you, da-da-da-da-da-da. The classic one was the game show host voiceover. 06:55 - Anne (Host) It has since evolved. 06:56 - Tom (Host) And basically they say that we've booked a studio in the area nearby. We're going to get paid or pay for the studio and then send us back the difference and something like that. And it's never a gig. 07:12 - Speaker 2 (Announcement) All they're trying to do is get you to cash that check and send them money, which is fraudulent, by the way. 07:18 - Anne (Host) And, by the way, I've gotten to the point where, if I have a new client, the only way they can really pay me is electronically. 07:25 And I figure, if you don't have electronic means to pay me immediately before the job and it's even in my terms and I've done this for years, Tom, I always have payment in full prior to job start is appreciated and other options available upon request. 07:39 But if it's a new client, I'll take that out because I must have that money in my bank account before I will even consider finishing that job or sending a file. And I'll tell you what, Tom for all of my career it's worked for me Because if people are serious about hiring you, they know that you're a professional, they know that you're going to get the job done. Of course they have to put their faith in you. But in reality and I'll even say because you're a new client I require payment up front electronically. And here are the ways that you can pay me. And so I'll send them, like a QuickBooks invoice, or I'll give them a PayPal account or however that works, and I expect that money in the account and I wait for that money and I make sure that I have the money and then I'll proceed with the job. 08:21 - Tom (Host) That's a really good idea. There's nothing wrong with even asking for 50% or 25% or just some percentage of it. The fact that they're actually going to fork over money with no expectation of an overpayment or getting it back or disputing the payment or anything like that. 08:37 Once it clears, you know that they're serious. And there's a bunch of like. I use Wave apps, for example. That's a great way to do it and I'm pretty sure they can do a partial payment. Or you can just make one invoice just for the deposit and then issue another invoice for the balance If they're a legitimate client that actually has money that they're planning on paying you with, they would have no problem with paying at least a portion of it up front. 08:59 - Anne (Host) Yeah, a lot of my clients nowadays the larger clients that used to like work off of purchase orders, and then it would be like 90 days after the job has been submitted. We'd have to wait for that check, they'd have to generate the PO and everything. You'd sign contracts like vendor contracts and that sort of thing, which I've done a lot, and so if they've got a contract for you to sign, that's vendor, nda, that sort of thing, and you know the company. It's like a well-known company. They're on the web. They've been on the web for years. I mean you can pretty much trust in that where I'll do the job and then I'll get paid. If I've worked with them before, I know that's typically how larger companies work and so that's when I'll accept a check. But even now most of those companies they're going to electronic deposit, like ACH they call it. 09:42 ACH, yeah, so it's direct deposit to your bank and most of the companies I know will do that and that's a form of payment that I trust and that would be a client that I would trust. So if it's a larger company that I know they exist on the web and they talk about, well, you're going to have to do the job first and then we'll be able to pay you once the purchase order is created, blah, blah, blah, blah, and you sign these contracts. I feel fairly good about that and I don't have to think, oh, this is a scam. But whenever I get an email without an actual signature file that comes from an address that isn't companycom, right, if it's a Gmail or a Yahoo or whatever, even a Microsoft what is the free Microsoft one? 10:20 Hotmail, hotmail, yeah, even if it's Microsoftcom, I feel like there's some sort of free sort of Microsoft. You know what I mean Like email that says that I just don't trust it and I'll immediately. The first thing I'll do is look for a website and when I get to the website I'll look for a phone number and then I'll actually try to call that phone number. What are the steps that you take, Tom, to ensure that your job is legit? 10:41 - Tom (Host) Everything that you just said. I also, by the way, I do love the ACH direct deposit because there's no fee. When PayPal, there is a fee, or wire transfer. That's really nice. Here's one thing that I've been doing lately is, if I get a we'll call it a solicitation, for lack of a better term from a company saying hey, and it'll most often be we found you on Google, we found you on Voice123 or some other front-facing thing. You know what's an interesting thing to do? Go look for them on LinkedIn. 11:11 Look for them on LinkedIn. Look for the company and look for the individual and see if you have any mutual connections. I mean, it could be anybody, whether it's a voice actor or somebody in some other profession, and you can reach out on LinkedIn and say, hey, I got an email from this company and you have a connection with them on LinkedIn. What's your experience with them? And that could give you some really quick insight. Sometimes it's just like, oh, I've been working with them for years, or it's oh, they're a huge scam. I forgot to disconnect with them. Run, run, run. Or I'd sent a rando invite, or they sent a rando invite and I don't have any information for you. But it could increase your chance of vetting them a little bit better. Another thing is that I keep an eye out, for is if they ask me to send them a W-9, the more likely that they are legitimate. 12:00 Yeah, yeah, absolutely, which I find interesting because if they were a real, true scam artist, they would want that W-9, because now they would have your social security number and now they can steal your identity too. 12:11 - Anne (Host) Well, oh my gosh, Tom, and that's scary actually, but that's why you don't put your social security number. You put your EIN number, because you're a company right, and you don't have to give up your EIN number, which is, by the way, one thing. I'm glad you mentioned that like we should all be having an EIN number. I'm glad you mentioned that, like we should all be having an EIN number. 12:30 - Tom (Host) Yes, it's very, very simple to get. It takes very, very little time. So it's a very easy get. I just reminded myself and we just talked about identity theft is that I almost had my identity stolen yesterday. 12:43 - Anne (Host) Whoa, that's scary. Yes. 12:45 - Tom (Host) How do you? 12:46 - Anne (Host) know like what happened. 12:51 - Tom (Host) Okay, so it was about a little after 10 am yesterday is when things started happening, so within a few minutes of each other, I got an email from Credit Karma, norton which, because I have my Norton 360 antivirus software package, I pay a subscription through that and Experian. For those of you who don't know, there are three major credit bureaus there's Experian, there's TransUnion and there's Equifax. I have a free account with Experian and I have a free account with Credit Karma. All three of them, within a few minutes of each other, messaged me and said that there was a hard inquiry. 13:30 - Anne (Host) Yeah. 13:30 - Tom (Host) So what that means is if you are applying for a loan, a mortgage, a credit card or something like that, the company that you're applying to will do a credit check. So they will check your credit and see if you are a safe credit risk to make the loan or to get the credit card, for this was a hard inquiry. If you get enough hard inquiries on your credit, your credit will go down. 13:55 - Anne (Host) Yeah, absolutely. I know that because I'm a stickler about my credit. 13:59 - Tom (Host) Me too. My credit rating, oh my gosh. If mine isn't at least 800, something I freak out, oh my gosh. 14:04 - Anne (Host) Yeah, no, mine has to be like almost close to perfect, and when it goes down like two points, I'm like wait why? Why did that happen? Right? And it's just because you put a charge on it for a few hundred dollars, and then you pay it off next week and then everything's fine, so that's normal. 14:18 - Tom (Host) So all three of them told me at roughly the same time that there was a hard inquiry. So I clicked on all the emails and all three of them said that somebody was applying for a Discover credit card, I think in Salt Lake City, and someone was applying for a Capital One credit card in Delaware, and I was in New York City neither applying for a Discover credit card or a Capital One credit card. I certainly wasn't in Salt Lake City or Delaware at the same exact time. 14:49 - Anne (Host) You know, what's so interesting, Tom, is that, like I don't know, a few months ago I don't know if there was a discussion circulating or maybe I got an email but somebody said, and like I should have done this years ago, I mean you can freeze your account so that if you don't open up a credit card every other day which I'm certainly not right Because again, it affects my credit rating and I'm anal about that and so I'm like well, I don't need to apply for any other credit cards, so you can go and freeze that, so that you can actually reduce the risk of somebody trying to open up credit cards or identity theft. 15:19 So and it's super simple to do it, as I said, everybody should have that free account. You should log in, you should check your credit scores regularly I think they allow you once a month, I think even my credit cards. My American Express will tell me oh, your FICO score has changed, right, so they're monitoring it too, and so literally, I get lots of notifications when that rating goes up and down. But I know that I've reduced my chances of identity theft, which is a very scary thing, by freezing those accounts and it's very simple to unfreeze. So, if you know you want to apply for a credit card. You just got to go and unfreeze it for a certain amount of time so you can apply for it and then freeze it back up again. So that way it reduces the risk. 15:57 - Tom (Host) And all those emails that I got, all those notifications did give me the option to do that. I was also able to say this because it, literally, when Norton 360 popped up and it took me to their website, it literally said is this you and you can check yes or no? And I wrote no and then the whole screen turned red saying okay, we know this is a problem, we will look into it. 16:17 It did it with all those and then I called Capital One Bank. It took me a few people. It had to get escalated a couple of times to the credit card fraud department. 16:25 - Anne (Host) Well, don't you say, they give you a special number, right? 16:27 - Tom (Host) They say call this number if it's not you, or you can call this number. I just called the general number because all that was on the notification, I think, was the Capital One in Salt Lake City or something like that. So I called directly and said please state your problem. I'm like I think I'm getting my identity stolen. And then it got up there and then they manually rejected the credit card application at least for the Capital One. 16:50 And then this morning I got another Credit Karma email saying that there was a check on my Equifax report not the Experian one and I looked at the date of it. It also said yesterday. So that means Credit Karma had my back twice and Experian had my back and Norton had my back twice. Right, right, and Experian had my back and Norton had my back and everybody bosses. This is the takeaway. Creditkarmacom is free, having an account with Experian is free, it doesn't cost you a nickel. 17:18 - Anne (Host) All of them TransUnion, they're all free TransUnion, Equifax, they're all free. 17:23 Exactly and you can check your scores and, like I said, a lot of banks and a lot of credit cards are actually adding that on as like a value add kind of service, but you don't have to pay anything for it. I think there's a lot of it going on, Tom, which is kind of scary. We got to be careful about scammers, that's for sure. And anytime, even in your email, right, if you get like again, if I find something that doesn't have a signature and then they have an attachment like PayPal has been well-known scams where you get like oh, you've got a PayPal invoice, right, and you have to pay this amount and it looks legit. I mean, they've got like the PayPal logo. I've gotten quite a few of those over the last six months. 18:01 - Speaker 2 (Announcement) And. 18:01 - Anne (Host) I just ignore anything. Just remember that most financial institutions will never email you for information and they'll never text you necessarily for that information either, and you should also, Tom. We should have a big discussion on having multi-factor authentication. 18:19 - Tom (Host) Yes. 18:19 - Anne (Host) This is extremely important. 18:21 - Tom (Host) It's annoying as hell or two-factor, two-factor authentication For every account that you have, especially the financial ones, you should have two-factor authentication, which means either they send you a text message and you just click on the link and you're good to go, or it sends you an email and it'll usually give you a passcode of some sort and then you go to the website. When you're trying to log on, you enter that passcode and then it'll let you do it, and most of them are only good. Some of them are only good for 30 days. Sometimes you can check a box saying this is my private computer. It's okay for a certain amount of time, or they make you do it every single time, which isn't the worst thing in the world. Yes, it's annoying. 18:55 - Anne (Host) You know what I just thought about. It is annoying but it keeps you safe. It's funny how much like value you put in that number, that phone number, in this phone which, by the way, I just got a new phone but in this number for the two-factor authentication, right Like text me at this number. So think of the power that these phone companies have right, and that is scary. I mean it used to be a thing where I always thought like the large scale communication companies were a little bit of a monopoly, depending on the area that you're in. I mean, when I lived in the East Coast it was always Verizon right, verizon everything, verizon this, verizon that. Out here it's a couple of different companies but still, if you think about it, I mean I'm glad to have the two-factor authentication and it's super convenient on the phone. 19:39 But, it's interesting to know that you wouldn't want the hackers to get smart right and then start really infiltrating the phone, you know, and impersonating a phone number. 19:50 - Tom (Host) There's a couple of things about that is that, when it comes to authentication, when you're logging on your phone, I've got it set up where I just use my thumbprint for a lot of it. 19:59 - Anne (Host) I love that, or Face ID yeah the Face ID is a great one. 20:05 - Tom (Host) There's also a thing for a lot of the websites where I have a personal PIN that has nothing to do with the PIN or the password to access the site itself. If I am using my phone to log in somewhere, I can enter a four-digit PIN that's different from everything else, so it also increases the chance of having a secure whatever. Also, just as a rule, I don't do anything financial on my phone, with the exception of like Venmo Well, I have mobile banking If I'm like sending money if, like me, and the guys are having pizza, you know what I mean. 20:31 - Anne (Host) I have mobile banking and I do have Apple Pay. 20:35 - Tom (Host) Well, I have GPay too. 20:36 - Anne (Host) Yeah, so. 20:36 - Tom (Host) I'm a Google guy but like I will unless to my bank accounts online or Wave app or Wise or PayPal on the phone, unless I absolutely have to. 20:49 - Anne (Host) Interesting. I go to them quite a bit. Actually, you're probably fine because of all the precautions that you're taking, but I'm just a little extra neurotic about it. Oh, it's constantly got multi-factor authentication, but I get that. I totally get that. Wow, yeah, being careful, and you know what. 21:02 What's interesting is, back in the day and I'm going to date myself when I was working at the school and we had text-based email okay, and text-based email, I could have something and it was all based on like the Unix systems and so like hacking into a text-based, like I don't know how to say this, but hacking into a system like that, like a Unix system, and reading your email with text-based, you didn't always have like the conditions of people attaching things that could be viral, loading a virus on your computer. So I was always proud to say that I used text-based email and I used something called a PGP signature, which was a digital signature at the time, which meant that when I sent mail out, my PGP signature, it would actually negotiate and verify with the person that I would send it to so that it could be a verified digital signature. That indeed, yes, this mail did come from me, and I think that Norton probably has something like that now right. Is that with your email or no? 21:59 - Tom (Host) Yeah, it has all kinds of functions. 22:01 And it works on my desktop and it works on my laptop and it works on my phone. The most important function that it has is when I'm not home and I'm on my phone or my laptop or my tablet is the VPN when you can turn it on to make sure that if you're using Wi-Fi at a cafe or something like that, that it's secure, because apparently there are people who just like sitting around at a Panera or a Starbucks with their laptop and just waiting for someone to have an insecure Wi-Fi connection and they can just steal their life right there through their own laptop. 22:31 - Anne (Host) Well, it's funny how this conversation has turned into a big security conversation, starting off with scamming. Which guys you got to be aware? It's one of the reasons why, for all of my years and because of my years working in technology, I like wired connections. I mean Wi-Fi. I mean it's a wonderful technology and it's convenient as anything. However, it's not as secure as a wired connection, because a wired connection is basically, you know, your digital numbers flowing back and forth along a wire, versus all this information out in the air where, if somebody is sitting outside of my home, they can possibly hack into my wireless network and then they can run some sort of a tracer to see and to actually get my passwords, which is something that you don't really want that to happen. So you should really be cautious, guys, and I think it's always a good idea that, if you are working from home, if you have the opportunity to have a wired connection to your router, I think that that's better rather than using Wi-Fi. Number one it's more stable, right, it's faster and it's also more secure. 23:32 - Tom (Host) I agree. If you have a desktop at home and you are doing any kind of recording or you're doing basically anything, you should have an ethernet connection. That yellow wire with the big old phone jack that plugs right into the back of your computer and plugs into your Wi-Fi router. 23:47 - Anne (Host) And it sounds old school, but it's still the most secure method of data transfer. 23:51 - Tom (Host) Without question so if you are recording from home. If you're doing whatever from home, you have a desktop ethernet. If you have a laptop, I are recording from home. If you're doing whatever from home, you have a desktop Ethernet. If you have a laptop, I think the newer laptops don't even have an Ethernet connection. I have to think about my laptop and whether I even have one anymore, and here's the simple reason. 24:06 - Anne (Host) Think about it. It's a wire, guys. It's a wire. It's not like data floating around in the air which people can listen to. Somehow the frequency of the data traveling in the air right? Wi-fi works on frequencies when your data is traveling via a wire like a physical cable, unless somebody like I don't even know, unless they tap into that wire, right, somehow. 24:26 I don't know how they do that, and we're talking about your wire in your house going from your computer to your router. Right, that's as secure as it gets, right, unless somebody's coming into your house and hacking into the wire and tapping into it. 24:38 - Tom (Host) You've got some foreign embassy bugging your home. 24:41 - Anne (Host) Yeah, yeah, doing some fancy work, you're not going to have to worry about your data being transferred. So if you're working on the internet right, at least the data that's transferring from your house to your router is absolutely secure. And then it's up to your internet provider right on the router, to their routers, to make sure that things are encrypted, things are secure and for the most part I mean that's been handled right. I mean there are hackers out there that they can hack into networks. They can hack into things like that, but you want to be as safe as you possibly can, so wired is best. 25:14 - Tom (Host) Yes, it's fascinating. We talk about hard security and soft security, yes, that's hard security, that's hard security. 25:20 - Anne (Host) So, if we go back to talking about the scams that are floating around these days, one thing I wanted to mention is I think one of the best applications for groups, facebook groups and social media groups and discussion groups is for that thing, so that you and Bridget were talking to one another about this job that you both got, and then it's really wonderful that we can come together as a community and protect each other right and say, hey, look, watch out for the scam. So it is one of the best advantages, I would say, of being a part of the social media groups in that way. Otherwise, we've talked about how it's hard to sometimes they're toxic, sometimes it's really hard to be on social media. But I would say one of the best reasons to be on social media, in those groups and in those forums, would be because of the protection that you're getting of us banding together and saying, hey, watch out, this is a scam. 26:09 - Tom (Host) Absolutely, it's one of the most important things. Community is more than just about you know rah rah and whoop whoop and you know we support you and feel better if you're feeling down, but like just actual education, along with inspiration and commiseration can literally save your identity Absolutely. 26:27 - Anne (Host) Wow, what a great conversation, Tom. So bosses out there, be aware of scams. Be cautious. Research, research. Take a look at those signatures when you get emails coming in, when you get something that's asking for lots of words and a good price and it seems too good to be true, guess what it might be. So make sure that you're communicating with the community as well, checking those jobs out and attach that AI rider to every one of your jobs. Now, it's simple. It's there at NAVA and it's free. You can attach that rider to every job. If you have a new client, make sure you're very careful with the payment options. You know we spoke about that. I always make sure I get money up front, or partial money up front, first to make sure that it's a legit client. What else did I miss, Tom, in this recap? 27:14 - Tom (Host) Hardware and software VPNs. 27:16 - Anne (Host) EINs yes. 27:19 - Tom (Host) Oh yeah, VPNs, EINs, Two-factor authentication. 27:20 - Anne (Host) I love it. Yeah, Make sure you guys are implementing all of that to keep yourself safe and secure. So great topic, Tom. I like geeking out like this. 27:30 - Tom (Host) Yeah, it's fun and helpful. 27:31 - Anne (Host) Yeah, I'm going to give a great big shout out to my sponsor, IPDTL. You too can connect and network like real bosses. Find out more at IPDTL.com. Guys have an amazing week and we'll see you next week. 27:52 - Speaker 3 (Announcement) Bye. Join us next week for another edition of VO BOSS with your host, Anne Ganguzza, and take your business to the next level. Sign up for our mailing list at voboss.com and receive exclusive content, industry revolutionizing tips and strategies and new ways to rock your business like a boss. Redistribution, with permission. Coast-to-coast connectivity via IPDTL.
In today's episode - you may have heard ads for services that allegedly lock your home's title. Are they worth it? Clark talks about how best to guard your greatest asset - your home. Also, as the economy goes into lower gear with layoffs more frequent, Clark has important new info for today's job seekers. Home Title Protection: Segment 1 Ask Clark: Segment 2 AI & Your Resume: Segment 3 Ask Clark: Segment 4 Mentioned on the show: CBS News: FBI Boston warns property owners, real estate agents about "title pirates" after I-Team reports How To Freeze and Unfreeze Your Credit With Experian, Equifax and TransUnion 4 Signs You're a Victim of Deed Theft (and How To Avoid It) 4 Insurance Policies You Actually Need (And 4 You Don't) Should You Buy an Extended Warranty on Your Car? Best Resume Template: 9 Ways To Update Your Resume CRASH Network - Insurer Report Card How to Shop for Lower Car Insurance Fidelity - Spending & Saving Money | Take Control of Your Money Best Online Banks: Free Checking and High-Interest Savings Accounts Clark.com resources Episode transcripts Community.Clark.com / Ask Clark Clark.com daily money newsletter Consumer Action Center Free Helpline: 636-492-5275 Learn more about your ad choices: megaphone.fm/adchoices Learn more about your ad choices. Visit megaphone.fm/adchoices
