#kidnapping-scams

[ follow ]
Parenting
fromSlate Magazine
2 days ago

My Mom Got a Call That I Was in a Horrific Accident. What She Did Next Can't Be Undone.

Scammers exploit emotional vulnerabilities, making it crucial to educate and protect against future scams.
fromwww.theguardian.com
16 hours ago

Buying a collectible? Beware fakers out to persuade you it's the real deal

Scams involving antiques and collectibles are almost as old as some of the items. But internet sales now mean fraudsters have a much wider audience.
E-Commerce
Social justice
fromwww.theguardian.com
1 day ago

Rise in number of girls being identified as victims in county lines exploitation, data shows

An increasing number of girls are identified as victims of county lines exploitation, rising from 15% to 22% of cases in one year.
California
fromCalifornia Post
3 days ago

Elderly victim lured into car, robbed of life savings in sick lottery scam

An elderly woman was robbed of $45,000 in a lottery scam targeting seniors in Santa Ana.
#job-scams
Careers
fromZDNET
1 day ago

FTC reports a surge in $220M job fraud - here's how to vet listings, according to recruiters

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
fromZDNET
6 days ago
Careers

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Careers
fromZDNET
1 day ago

FTC reports a surge in $220M job fraud - here's how to vet listings, according to recruiters

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Careers
fromZDNET
6 days ago

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Law
fromMoneywise
1 day ago

Towing scams are surging across the U.S. - and one NYC case shows just how brazen these companies have become

Clutch Towing in Brooklyn continues to operate despite a settlement for overcharging customers, leaving victims like Michael Medved with hefty fees.
France news
fromAxios
1 day ago

Priceless items are easy to steal. They're increasingly harder to sell.

Thieves stole three valuable paintings from a small Italian museum in a quick smash-and-grab operation.
fromFortune
2 days ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

"Any numbers that we see, it's the tip of the iceberg," said Melissa Stroebel, vice president of research and strategic insights at Thorn, a nonprofit that builds technology to combat online child sexual exploitation. "That is about what has been either detected or proactively reported."
Digital life
#phishing
Information security
fromTechzine Global
6 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromThe Hacker News
4 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromSecuritymagazine
5 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromTechzine Global
6 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
#ice
fromSilicon Canals
3 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#malware
fromThe Hacker News
2 days ago
Information security

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Information security
fromThe Hacker News
2 days ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
#online-scams
Cryptocurrency
fromnews.bitcoin.com
4 days ago

FBI Sting Operation Exposes Crypto Price Rigging Network as 10 Foreign Nationals Charged, Over $1M Seized

Federal crackdown reveals a network of alleged crypto price manipulation, highlighting increased enforcement risks for digital asset firms.
UK news
fromBBC News
4 days ago

Pair jailed for advertising small boat crossings on Facebook

Hoang and Hop facilitated illegal migrant crossings to the UK using social media and were arrested after a five-month surveillance operation.
NYC politics
fromHoodline
5 days ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
Psychology
fromPsychology Today
5 days ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
UK politics
fromwww.independent.co.uk
6 days ago

Less than one per cent of phone theft cases lead to a criminal charge, figures show

Fewer than 1% of mobile phone thefts lead to charges, with 95% of cases closed by the Met Police without identifying a suspect.
#fbi
California
fromLos Angeles Times
1 day ago

Santa Monica man charged with kidnapping of UCLA student, rape of a separate woman

A Santa Monica man has been charged with rape and kidnapping related to two separate incidents involving female victims.
#cybersecurity
fromThe Hacker News
5 days ago
Information security

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
fromTheregister
1 week ago
Information security

Voice phishing skyrockets as smooth crims talk their way in

Voice phishing became the second most common method for cybercriminals to gain access to IT systems in 2025.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
4 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromComputerWeekly.com
3 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
5 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Social justice
fromPsychology Today
6 days ago

The Psychology of Sex Trafficking

Sex trafficking is a severe human rights violation, often misunderstood, with survivors criminalized instead of protected and rooted in societal norms.
Relationships
fromwww.theguardian.com
2 weeks ago

Friendship fraud: warnings of rise in insidious' scam targeting older people

Friendship fraud targets older individuals, exploiting their loneliness and leading to significant financial losses through small, repeated requests for money.
Information security
fromFortune
3 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Cryptocurrency
fromCointelegraph
1 week ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Privacy technologies
fromTheregister
3 weeks ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
SF parents
fromCalifornia Post
3 weeks ago

California girl, 11, who vanished in 2020 is found living in North Carolina under a different name

An 11-year-old girl kidnapped from California in 2020 was found in North Carolina enrolled in school under a false name and placed into protective custody.
fromFast Company
3 weeks ago

Online scam centers in Cambodia targeted with new legislation setting hefty fines and prison time

This law is the most important legal instrument for Cambodia in combating scams online, fighting money laundering and demonstrating that Cambodia is not a paradise or a safe haven for criminals. The new legislation approved by the Cabinet sets five to 10 years in prison and a fine of 500 million to 1 billion riels for organizing or directing a technology fraud site.
World news
fromABC7 San Francisco
3 weeks ago

Southern California girl kidnapped in 2020 found safe in North Carolina

These are very rare occurrences to have such a positive outcome on such an old case as this, but it reminds us that through hard work, and dedication, and cooperation, stories with positive outcomes like these can happen.
SF parents
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#locksmith-scams
UK news
fromwww.theguardian.com
4 weeks ago

The 49 driller killer': steps to avoid locksmith scams

Rogue locksmiths use bait-and-switch tactics, advertising low prices online then charging 10 times more upon arrival, exploiting vulnerable customers locked out of their homes.
UK news
fromwww.bbc.com
1 month ago

'I was threatened with rape after locksmith scam'

A woman was scammed by a rogue locksmith who inflated charges from £49 to £1,293 and subsequently threatened her with sexual violence via text message.
UK news
fromwww.theguardian.com
4 weeks ago

The 49 driller killer': steps to avoid locksmith scams

Rogue locksmiths use bait-and-switch tactics, advertising low prices online then charging 10 times more upon arrival, exploiting vulnerable customers locked out of their homes.
UK news
fromwww.bbc.com
1 month ago

'I was threatened with rape after locksmith scam'

A woman was scammed by a rogue locksmith who inflated charges from £49 to £1,293 and subsequently threatened her with sexual violence via text message.
fromCointelegraph
1 month ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering derives from the Chinese expression 'Sha Zhu Pan,' which refers to nurturing a target like livestock prior to slaughter. Applied to fraud, it entails scammers forging deep personal connections over extended periods. They then coax victims into sending funds to a deceptive digital currency venture.
Cryptocurrency
Privacy technologies
fromSecurityWeek
1 month ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Relationships
fromwww.theguardian.com
1 month ago

Romance fraud: warning over scam that turns victims into insurance cheats

Scammers recruit romantic partners into staged accidents or fake insurance claims to exploit victims' identities and trigger fraudulent payouts, harming victims' insurance and credit records.
Information security
fromTheregister
1 week ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
#ransomware
#child-sexual-abuse
Toronto
fromwww.cbc.ca
1 month ago

Toronto police warn residents of rampant romance scams, 2 arrests | CBC News

Two Mississauga residents were arrested for an alleged romance scam that reportedly defrauded victims across Canada and the U.S. of about $250,000.
fromwww.theguardian.com
2 months ago

Chilling' hacking network is targeting vulnerable children, charity warns

The Molly Rose Foundation (MRF) said online networks linked to a global ecosystem labelled the Com were carrying out extreme exploitation, cyberbullying, violence and abuse and called for a coordinated global response from governments, regulators, law enforcement and tech companies. The warning follows the publication of a report by the online risk consultancy Resolver in partnership with the MRF, which was founded by the family of Molly Russell, a British teenager who killed herself in 2017 after viewing harmful content online.
Mental health
Canada news
fromwww.cbc.ca
1 month ago

Police seeking help to identify man in 'fake' kidnapping and ransom plot | CBC News

York Regional Police seek help identifying Guan Yu Wu, believed to have lured a youth into a fake kidnapping and ransom scam targeting Chinese students.
Philosophy
fromAeon
2 months ago

Inside the criminal world of Southeast Asia's scam compounds | Aeon Essays

Scam compounds in Southeast Asia abduct and exploit workers, using torture, blood extraction, and organized operations to run large-scale online fraud targeting global victims.
#social-engineering
fromSilicon Canals
2 months ago
Psychology

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

fromSilicon Canals
2 months ago
Psychology

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

France news
fromwww.mercurynews.com
1 month ago

Passing neighbor rescues women imprisoned in crypto kidnapping

A 35-year-old woman and her 67-year-old mother escaped a cryptocurrency-linked kidnapping after 30 hours when a neighbor freed them; six suspects were later arrested.
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Mental health
fromPsychology Today
1 month ago

Understanding and Preventing Image-Based Sexual Abuse

Image-based sexual abuse is sexual violence causing enduring social, psychological, and economic harm, requiring changes in consent norms, empathy, and accountability for prevention.
Information security
fromwww.theguardian.com
3 weeks ago

Fake rooms, props and a script to lure victims: inside an abandoned Cambodia scam centre

Thai military seized a sprawling compound on the Thai-Cambodian border used by criminal groups for elaborate, industrial-scale fraud schemes targeting victims across Asia, Australia, and South America.
Information security
fromComputerWeekly.com
3 weeks ago

Interpol obliterates cyber criminal infrastructure | Computer Weekly

Interpol's Operation Synergia III neutralized 45,000 malicious IP addresses and servers across 72 countries, resulting in 94 arrests and over 100 investigations targeting cyber fraud, phishing, malware, and ransomware infrastructure.
Privacy professionals
fromSlate Magazine
1 month ago

Help! We Just Dodged an Obvious Scam Call. But One Thing the Scammer Said Has Us Extremely Worried.

A man is falsely credited as the named creator of an Islamophobic book under his name, risking career and reputation; he seeks removal.
#cryptocurrency
fromPCWorld
4 weeks ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromSecuritymagazine
1 month ago

Why Security Teams Can No Longer Ignore Recruitment Fraud

AI-powered recruitment fraud exploits human trust in hiring workflows, with job scams surging over 1,000% as attackers use deepfakes and impersonation to target vulnerable candidates and organizations during periods of labor market volatility.
#malvertising
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Information security
fromTravel + Leisure
1 month ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
Information security
fromTheregister
1 month ago

Crims hit a $20M jackpot via malware-stuffed ATMs

ATM jackpotting malware enabled thieves to steal over $20 million by forcing compromised ATMs to dispense cash without bank authorization.
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromSecurityWeek
1 month ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
fromSilicon Canals
1 month ago

The phone call scam targeting grandparents that sounds so real even cautious people fall for it - Silicon Canals

The phone rings at 2:47 AM. Your heart pounds as you fumble for the receiver. "Grandma?" The voice is shaky, desperate. "I'm in trouble. I got arrested. Please don't tell Mom and Dad." The voice sounds just like your grandson. He uses the nickname only family knows. He remembers that trip you took together last summer. Everything about this call feels real because, in many ways, it is.
Information security
Information security
fromTheregister
1 month ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
#cryptocurrency-theft
Information security
fromTheregister
2 months ago

For the price of Netflix, crooks can rent AI crime ops

AI tools, including Dark LLMs and deepfakes, have commodified cybercrime into rentable, automated services that enable large-scale impersonation and fraud.
Information security
fromSecuritymagazine
2 months ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
fromWIRED
2 months ago

He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive

He was writing from hell, 8,000 miles away. A summer shower had left a rainbow over my Brooklyn neighborhood, and my two children were playing in a kiddie pool on the roof of our apartment building. Now the sun was setting, while I-in typical 21st-century parenting fashion, forgive me-compulsively scrolled through every app on my phone. The message had no subject line and came from an address on the encrypted email service Proton Mail: "vaultwhistle@proton.me." I opened it.
Information security
[ Load more ]