#return-scams

[ follow ]
Information security
fromZDNET
19 hours ago

The shadowy SIM farms behind those incessant scam texts - and how to stay safe

SIM farms are used by cybercriminals for financial fraud, spam, phishing, and online product scalping.
#phishing
Deliverability
fromTechRepublic
21 hours ago

New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert

A phishing scam mimics an Apple security alert to trick users into calling a fake support number and potentially compromising their accounts.
Information security
fromSecurityWeek
5 days ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Information security
fromSecuritymagazine
3 weeks ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
4 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Deliverability
fromTechRepublic
21 hours ago

New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert

A phishing scam mimics an Apple security alert to trick users into calling a fake support number and potentially compromising their accounts.
Information security
fromSecurityWeek
5 days ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Information security
fromSecuritymagazine
3 weeks ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
4 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
#artificial-intelligence
fromWIRED
20 hours ago
Artificial intelligence

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
21 hours ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
Artificial intelligence
fromWIRED
20 hours ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
21 hours ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
EU data protection
fromwww.theguardian.com
2 hours ago

Some Interrail travellers told to cancel passports as hacked data posted online

Holidaymakers in Europe must replace passports after personal data was hacked and sold on the dark web, causing stress and financial burden.
Privacy professionals
fromwww.theguardian.com
5 hours ago

Criminal gangs profiting as child sexual abuse websites double, experts say

The number of commercial child sexual abuse websites has doubled in a year, highlighting a significant increase in online exploitation by criminal gangs.
#meta
fromTNW | Meta
1 day ago
EU data protection

Meta sued over scam ads on Facebook and Instagram as internal documents reveal $16 billion in projected fraud revenue

Privacy professionals
fromFOX 5 DC
1 day ago

Meta profited billions from scam ads while misleading users: lawsuit

Meta is accused of profiting from scam ads on Facebook and Instagram while misleading users about its efforts to combat them.
fromEngadget
1 day ago
Privacy professionals

Meta has misled users about scam ads on Facebook and Instagram, lawsuit says

Meta is being sued for allegedly prioritizing profits over user safety by allowing scam ads on its platforms.
EU data protection
fromTNW | Meta
1 day ago

Meta sued over scam ads on Facebook and Instagram as internal documents reveal $16 billion in projected fraud revenue

Meta faces multiple lawsuits alleging it profited from scam ads on its platforms, projecting $16 billion in revenue from fraudulent advertising in 2024.
Privacy professionals
fromFOX 5 DC
1 day ago

Meta profited billions from scam ads while misleading users: lawsuit

Meta is accused of profiting from scam ads on Facebook and Instagram while misleading users about its efforts to combat them.
Privacy professionals
fromEngadget
1 day ago

Meta has misled users about scam ads on Facebook and Instagram, lawsuit says

Meta is being sued for allegedly prioritizing profits over user safety by allowing scam ads on its platforms.
fromAfrica Check
2 days ago

Imposter Facebook page uses Watu branding to lure users into paying for non-existent goods

The page advertises a variety of products, including smartphones, audio systems, cookers, and TVs, requiring a small deposit from interested customers.
Fundraising
Digital life
fromThe New Yorker
15 hours ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
#ransomware
Law
fromTheregister
2 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Healthcare
fromNextgov.com
2 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromThe Hacker News
1 day ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
fromTechCrunch
1 day ago
Information security

Ransomware negotiator pleads guilty to helping ransomware gang | TechCrunch

Law
fromTheregister
2 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Healthcare
fromNextgov.com
2 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromThe Hacker News
1 day ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
fromTechCrunch
1 day ago
Information security

Ransomware negotiator pleads guilty to helping ransomware gang | TechCrunch

fromCointelegraph
2 days ago

Fake Police Raid Scam Forces Victim to Send $1M in Bitcoin

The French case illustrates how attackers used a fake police raid and violence to force a Bitcoin transfer worth $1 million, bypassing encryption entirely by compelling the victim to authorize the transaction.
Cryptocurrency
#data-breach
France news
fromEngadget
18 hours ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
Privacy professionals
fromTechCrunch
22 hours ago

Cosmetics giant Rituals confirms data breach of customer membership records | TechCrunch

Rituals confirmed a data breach affecting customers' personal information after hackers stole data from its membership database.
France news
fromEngadget
18 hours ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
Privacy professionals
fromTechCrunch
22 hours ago

Cosmetics giant Rituals confirms data breach of customer membership records | TechCrunch

Rituals confirmed a data breach affecting customers' personal information after hackers stole data from its membership database.
#cybersecurity
Information security
fromTechRepublic
21 hours ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
DevOps
fromSecuritymagazine
1 day ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromTechRepublic
21 hours ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Information security
fromTheregister
4 hours ago

Sharing isn't caring if it's an admin password: Pwned

Prioritizing convenience over security can lead to significant data loss, as demonstrated by a client using a common password and sharing it publicly.
Careers
fromwww.theguardian.com
2 days ago

AI job scams are booming and I was fooled by one. Here is how to avoid them

A seemingly perfect job opportunity turned out to be a scam, revealing red flags throughout the recruitment process.
#fraud
Pets
fromMail Online
3 days ago

Fraudsters use AI to try and swindle $2,800 from missing dog's family

Fraudsters used AI to create fake emergency surgery images to scam a family out of $2,800 for their missing dog.
Pets
fromMail Online
3 days ago

Fraudsters use AI to try and swindle $2,800 from missing dog's family

Fraudsters used AI to create fake emergency surgery images to scam a family out of $2,800 for their missing dog.
California
fromFortune
4 days ago

A bizarre insurance scam was exposed as 'clearly a human in a bear suit' damaging luxury cars | Fortune

Three individuals in California staged insurance fraud using a bear costume to claim damages on luxury cars, seeking nearly $142,000 in payouts.
fromwww.housingwire.com
5 days ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
Marketing tech
fromSFGATE
6 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Deliverability
fromSecurityWeek
3 hours ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
Privacy professionals
fromReadWrite
3 hours ago

Caesars sued over 2026 data breach claims

Caesars Entertainment faces a class action lawsuit for failing to protect customer data during a second cyber incident after a previous breach in 2023.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Lazarus Group Suspected of Moving $175M in ETH After Arbitrum Freezes $71M From KelpDAO Exploit

Lazarus Group drained 116,500 rsETH from KelpDAO, with significant funds frozen and laundered through various protocols.
Fundraising
fromIndependent
2 days ago

Company has more than 2m stolen from account following cyber attack

Future Energy Capital Limited lost over €2m due to a cyber attack last October.
Apple
fromMail Online
2 weeks ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
Privacy professionals
fromTechCrunch
27 minutes ago

Another customer of troubled startup Delve suffered a big security incident | TechCrunch

Delve faces multiple allegations and security incidents, leading to loss of customers and damaged reputation.
#cryptocurrency
Cryptocurrency
fromSecurityWeek
2 days ago

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

North Korea-linked Lazarus Group executed a $290 million cryptocurrency heist from Kelp DAO using sophisticated attack methods.
Information security
fromSecurityWeek
2 days ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Cryptocurrency
fromSecurityWeek
2 days ago

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

North Korea-linked Lazarus Group executed a $290 million cryptocurrency heist from Kelp DAO using sophisticated attack methods.
Information security
fromSecurityWeek
2 days ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
#malware
fromTechRepublic
20 hours ago
Information security

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTechRepublic
5 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromTechRepublic
20 hours ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTechRepublic
5 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Apple
fromTechRepublic
1 week ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Careers
fromZDNET
3 weeks ago

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
#ai
Information security
fromHarvard Gazette
22 hours ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Information security
fromSecurityWeek
4 hours ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromHarvard Gazette
22 hours ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Privacy professionals
fromSecuritymagazine
1 day ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Information security
fromSecuritymagazine
1 day ago

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Unauthorized access to Anthropic's AI model, Claude Mythos Preview, raises security concerns among experts due to its ability to identify digital vulnerabilities.
Privacy professionals
fromZDNET
3 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Cryptocurrency
fromCointelegraph
1 month ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Information security
fromWIRED
22 hours ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
fromFingerlakes1.com
1 month ago

Report: NYS among worst states for online, social media scams | Fingerlakes1.com

They have to have a real name or organization. They have to have a physical address. There has to be a phone number. There has to be some type of tax ID or other type of financial identification so you know exactly who you're dealing with.
US news
Information security
fromTechRepublic
22 hours ago

Malicious TikTok Downloader Extensions Quietly Compromised 130K Users

Browser extensions disguised as TikTok video downloaders are compromising user data, highlighting vulnerabilities in enterprise security.
Information security
fromTechzine Global
1 day ago

As Mythos fixes Mozilla flaws, unauthorized access spells disaster

Firefox's Claude Mythos Preview addresses 271 vulnerabilities, but unauthorized access raises concerns about potential misuse by threat actors.
fromSilicon Canals
2 months ago

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Last month, I sat across from one of the brightest people I know as he explained how he'd lost nearly everything to a sophisticated scam. This wasn't some naive teenager or technophobe. This was my friend from university days, a retired executive who'd navigated corporate politics for decades and made shrewd investment decisions his whole life. Watching him piece together how it happened was like watching someone solve a puzzle in reverse.
Psychology
Information security
fromTheregister
2 days ago

Adaptavist Group breach: Ransomware crew claims mega-haul

Adaptavist Group is investigating a security breach involving stolen credentials, while a ransomware group claims to have accessed extensive data.
#email-fraud
Relationships
fromwww.theguardian.com
1 month ago

Romance fraud: warning over scam that turns victims into insurance cheats

Scammers recruit romantic partners into staged accidents or fake insurance claims to exploit victims' identities and trigger fraudulent payouts, harming victims' insurance and credit records.
Information security
fromBusiness Matters
6 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Information security
fromTechCrunch
1 week ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
#cybercrime
fromTechRepublic
2 weeks ago
Information security

New Scam Alert: QR Codes Replace Links in Traffic Ticket Phishing

Cybercriminals are using QR codes in traffic-violation scams to deceive victims into providing sensitive information.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Information security
fromThe Hacker News
2 weeks ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy professionals
fromComputerworld
1 month ago

Cyber criminals too are working from home... your home

The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
Information security
fromTheregister
4 weeks ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Information security
fromTechzine Global
1 month ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Privacy professionals
fromSlate Magazine
2 months ago

Help! We Just Dodged an Obvious Scam Call. But One Thing the Scammer Said Has Us Extremely Worried.

A man is falsely credited as the named creator of an Islamophobic book under his name, risking career and reputation; he seeks removal.
fromABC11 Raleigh-Durham
1 month ago

Do you tap to pay? 'Ghost tapping' scams could target your money

The ease of use means the ease of stealing. There are pieces of software and devices that are doing exactly the same thing that a point of sale does and it's transacting on your phone or on your credit card and if you don't have a thumbprint or a biometric on your phone, they can walk up and if you're not paying attention in a crowded area, they get close enough and they touch your phone they can do a transaction.
Information security
fromPCWorld
1 month ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromSecurityWeek
2 months ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
Information security
fromTravel + Leisure
1 month ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromZDNET
2 months ago

No, the IRS didn't text or email you - 3 ways to protect yourself from scams

Messages claiming you're due a tax refund are scams aiming to steal bank or Social Security numbers; report them and delete without responding.
Information security
fromArs Technica
2 months ago

There's a rash of scam spam coming from a real Microsoft address

The legitimate Microsoft Power BI address no-reply-powerbi@microsoft.com is being abused to send scam emails that prompt victims to call numbers and install remote-access software.
fromMashable
1 month ago

Hackers use this tool to bypass fraud detection and weaponize Google ads

The service, referred to as 1Campaign, provides hackers with a one-stop-shop for running malicious ads and enabling fraud "at scale," a recent report by cybersecurity company Varonis uncovered. Using just a single dashboard, hackers can cloak malicious content from security researchers, ad platform reviewers, and automated scanners - who instead see a benign white page - and target general users with phishing or scam attempts.
Information security
fromTechzine Global
1 month ago

How phishing service Tycoon 2FA went under

Tycoon 2FA, a Phishing-as-a-Service (PhaaS) platform, enabled thousands of cybercriminals to steal login credentials and session tokens. Even accounts secured with MFA could be compromised via a single email. The service had been active since at least 2023 and quickly grew to become one of the most widely used phishing platforms in the world.
Information security
[ Load more ]