#signature-forgery

[ follow ]
Information security
fromThe Hacker News
1 hour ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#deepfakes
Law
fromAbove the Law
15 hours ago

Deepfakes And The Future Of Litigation: Are We Ready? - Above the Law

Deepfakes will challenge the judicial system, requiring more rigorous evidence authentication and potentially altering courtroom procedures.
Law
fromAbove the Law
15 hours ago

Deepfakes And The Future Of Litigation: Are We Ready? - Above the Law

Deepfakes will challenge the judicial system, requiring more rigorous evidence authentication and potentially altering courtroom procedures.
fromNature
13 hours ago

How DNA forensics is transforming studies of ancient manuscripts

"It had its own biography, its own deep history. It seemed like an archaeological site between covers," recalls Stinson, who is now a medievalist at North Carolina State University in Raleigh.
History
#ai-fraud
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Canada news
fromwww.cbc.ca
14 hours ago

Suspects in alleged counterfeit currency sales ring arrested by Halton police | CBC News

Police arrested six suspects in a counterfeit currency sales ring operating through social media, generating over $60,000 in sales.
fromwww.theguardian.com
2 days ago

Buying a collectible? Beware fakers out to persuade you it's the real deal

Scams involving antiques and collectibles are almost as old as some of the items. But internet sales now mean fraudsters have a much wider audience.
E-Commerce
Privacy technologies
fromComputerWeekly.com
4 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#art-theft
Paris food
fromEntrepreneur
5 days ago

It Took Thieves 3 Minutes to Steal $10 Million in Art. Here's Why Museum Heists Are Becoming More Common.

A well-planned heist resulted in the theft of three valuable paintings worth $10 million from the Magnani-Rocca Foundation in Italy.
Paris food
fromEntrepreneur
5 days ago

It Took Thieves 3 Minutes to Steal $10 Million in Art. Here's Why Museum Heists Are Becoming More Common.

A well-planned heist resulted in the theft of three valuable paintings worth $10 million from the Magnani-Rocca Foundation in Italy.
Information security
fromThe Hacker News
1 hour ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Europe news
fromIrish Independent
6 days ago

Woman (20s) arrested in probe over fraudulent passports to launder over 160,000

Gardaí arrested a woman and seized documents and a car during a search in south Dublin as part of Operation Skein targeting international fraud.
#fraud
#cybersecurity
fromTheregister
2 weeks ago
Information security

Voice phishing skyrockets as smooth crims talk their way in

Voice phishing became the second most common method for cybercriminals to gain access to IT systems in 2025.
Information security
fromNextgov.com
16 hours ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
#phishing
Privacy professionals
fromSecurityWeek
2 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy professionals
fromSecurityWeek
2 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Boston
fromBoston.com
2 weeks ago

Don't be fooled by this fake court notice scam in Mass., NH, authorities warn

Authorities in Massachusetts and New Hampshire warn about fake court notices sent by scammers, urging the public to verify unexpected communications.
fromNews 12 - Default
2 weeks ago

Illegal skimming device found on credit card machine in East Flatbush

"I told [Brown] to just shake the machine, gently shake the machine. If something comes off, then that's how we know that [a scammer is] scamming him, there's a skimmer on it."
US news
Relationships
fromSlate Magazine
2 weeks ago

My Husband's Fear of Identity Theft Is Making Our House Unlivable

Pre-approved credit card offers contain insufficient information for identity theft; shredding all junk mail is unnecessary, though tearing by hand adds minimal extra security.
Media industry
fromPsychology Today
2 weeks ago

Build Your Digital Detective Kit

Digital and media literacy skills are essential for all online users to navigate AI-generated content, partisan framing, and viral misinformation in today's information landscape.
Information security
fromSecurityWeek
6 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
fromLos Angeles Times
3 weeks ago

Burglary probe uncovers $6 million in stolen luxury goods, including Hermes bags, Rolex watches

A man broke into the victim's home and stole more than $600,000 worth of property, including designer handbags and jewelry. After weeks of investigating, including working with San Diego and Glendale police, authorities executed a search warrant on the suspect's home in Temecula on Feb. 25 and found the victim's property and a whole lot more.
California
Psychology
fromBusiness Insider
3 weeks ago

The 10-second trick to spot a liar, according to a psychopathy researcher

Open-ended and unexpected questions make it harder for people with dark personality traits to lie convincingly.
fromBoston.com
3 weeks ago

11 charged after allegedly staging robberies to claim victim status on immigration applications

The scheme began in March 2023, when Rambhai Patel, then 36, carried out staged armed robberies with co-conspirators at at least six convenience stores, liquor stores, and fast food restaurants in Massachusetts and other states. Prosecutors said the robberies were designed to help store clerks falsely claim they were victims of violent crimes in applications for U nonimmigrant status, commonly known as a U visa.
Boston
#locksmith-scams
UK news
fromwww.theguardian.com
4 weeks ago

The 49 driller killer': steps to avoid locksmith scams

Rogue locksmiths use bait-and-switch tactics, advertising low prices online then charging 10 times more upon arrival, exploiting vulnerable customers locked out of their homes.
UK news
fromwww.bbc.com
1 month ago

'I was threatened with rape after locksmith scam'

A woman was scammed by a rogue locksmith who inflated charges from £49 to £1,293 and subsequently threatened her with sexual violence via text message.
UK news
fromwww.theguardian.com
4 weeks ago

The 49 driller killer': steps to avoid locksmith scams

Rogue locksmiths use bait-and-switch tactics, advertising low prices online then charging 10 times more upon arrival, exploiting vulnerable customers locked out of their homes.
UK news
fromwww.bbc.com
1 month ago

'I was threatened with rape after locksmith scam'

A woman was scammed by a rogue locksmith who inflated charges from £49 to £1,293 and subsequently threatened her with sexual violence via text message.
Business intelligence
fromSecuritymagazine
4 weeks ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Privacy technologies
fromTheregister
3 weeks ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
Miscellaneous
fromPadailypost
1 month ago

Stolen mail recovered

Police recovered over 1,500 stolen mail pieces and arrested two suspects after a two-month investigation into postal theft at a Mountain View apartment complex.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
East Bay (California)
fromThe Oaklandside
1 month ago

Deadly lookalikes

An unusually wet winter in the Bay Area caused a surge in deadly death cap mushrooms, leading to unprecedented poisonings disproportionately affecting immigrant communities who forage based on traditional knowledge.
Los Angeles
fromLos Angeles Times
1 month ago

It starts with a tap on the shoulder and ends with being fleeced. Alleged ATM scam duo sought

Scammers target elderly ATM users by observing PIN entry, dropping money as distraction, and swapping real cards with counterfeits to steal thousands of dollars.
#phishing-as-a-service
Privacy technologies
fromSecurityWeek
1 month ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Privacy technologies
fromSecurityWeek
1 month ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
US news
fromwww.nydailynews.com
1 month ago

Woman reported missing in New Haven last year arrested for bank fraud in Bay Area

A woman reported missing in Connecticut was arrested in California with two New Yorkers for operating a multi-state bank fraud and identity theft scheme targeting financial institutions.
Information security
fromSecurityWeek
3 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromTheregister
3 weeks ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Science
fromTechCrunch
1 month ago

FBI says ATM 'jackpotting' attacks are on the rise, and netting hackers millions in stolen cash | TechCrunch

ATM jackpotting has become organized criminal activity, with over 700 attacks in 2025 stealing at least $20 million using physical access and Ploutus malware.
Information security
fromSecurityWeek
3 weeks ago

The Human IOC: Why Security Professionals Struggle with Social Vetting

Security teams must apply the same rigorous vetting standards to people and organizations as they do to security information to avoid reputational damage and poor decision-making.
#sports-memorabilia-theft
fromIndependent
1 month ago

Offaly farmer wants gardai to reopen probe into how his signature on property deed was 'forged'

A farmer is calling on gardaí to reopen an investigation to establish how his signature was allegedly forged on a property deed, making him the legal owner of a building he never paid for.
Real estate
fromwww.cbc.ca
2 months ago

Fake names and fake passports': Canadian crypto fugitive travelled the world before landing in Serbian jail | CBC News

As his flight departed from Amsterdam's Schiphol airport en route to Kuwait via Istanbul, Canadian crypto fugitive Andean Medjedovic was unaware that his globe-trotting lifestyle would soon be halted. Just two weeks later, on Dec. 11, 2023, Dutch authorities issued a European arrest warrant for the then 21-year-old, alleging he had pulled off a "sophisticated hack" that netted him $48 million US in cryptocurrency.
Cryptocurrency
Gadgets
fromThe Verge
2 months ago

Ring can verify videos now, but that might not help you with most AI fakes

Ring Verify attaches a digital security seal to Ring cloud downloads and confirms a video is unmodified since download; any edit causes verification to fail.
Information security
fromSecurityWeek
4 weeks ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
#digital-forensics
Higher education
fromNature
2 months ago

Six steps to protect researchers' digital security

Academic freedom and researchers' safety are deteriorating globally due to harassment, political interference, legal threats, and underreporting.
Education
fromBoston.com
2 months ago

Woman who posed as student at Boston high schools accepts plea deal, sentenced to probation

A former Massachusetts social worker pleaded guilty to forgery, identity fraud, and conduct violations after posing as a student at three Boston high schools.
Information security
fromSecuritymagazine
4 weeks ago

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

Object-specific protection is essential as a primary security layer to prevent art theft, as comprehensive facility-wide systems fail when adversaries physically interact with high-value objects without triggering alarms.
Miscellaneous
fromIndependent
1 month ago

Man with no links to Ireland was given Irish passport after falsely claiming to be son of murdered woman

Algerian with five aliases and no Irish links obtained an Irish passport online by falsely claiming to be the son of a murdered Irish woman.
#vehicle-burglary
E-Commerce
fromPractical Ecommerce
2 months ago

The Fraud Hiding in Email Signups

Fake but valid email accounts enable card testing and coupon abuse, causing chargebacks, revenue and inventory loss, and jeopardizing merchant payment relationships.
US news
fromABA Journal
2 months ago

Scammers solicit gift card purchases posing as district attorney

Scammers impersonating the Santa Barbara County district attorney contact residents by email and text to solicit gift card purchases and personal information.
#identity-theft
fromSFGATE
2 months ago

Body found halfway across country ties back to horrific Calif. criminal

Ronald Joseph Cole was a 19-year-old with a shy smile and a buzz cut in 1965, the year he moved from San Diego to Fillmore, a town about 25 miles from Santa Clarita. He was just starting out in life and, hoping to find a job, moved in with his older half-brother David LaFever. By May 1965, Cole had stopped contacting relatives. He had disappeared.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Privacy professionals
fromwww.theguardian.com
2 months ago

To shred or not to shred? Is it OK to throw out sensitive documents?

Shred or destroy mail containing name and address to reduce risk of identity theft from discarded documents, despite claims that all information is digital.
US news
fromBoston.com
2 months ago

A man impersonating an FBI agent tried to get Luigi Mangione out of jail, authorities say

A Minnesota man impersonated an FBI agent at Brooklyn's Metropolitan Detention Center attempting to free Luigi Mangione; he was arrested and charged.
fromwww.bbc.com
2 months ago

Secret filming catches locksmith charging 10 times quote

A couple initially expecting to pay less than 50 for a locksmith became victims of a "bait-and-switch scam" which ended up costing them more than 5,000, an investigation has found. The scam involves baiting a customer with an initial cheap quote before adding on hidden charges and carrying out unnecessary work that leads to spiralling costs. As part of the BBC's investigation, the company involved - 24/7 Locksmiths UK - was secretly filmed trying to charge up to 10 times the original quote for the job.
UK news
fromTechCrunch
1 month ago

U.S. and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools | TechCrunch

LeakBase has been operating since 2021, the authorities said, and had a continuously maintained archive of hacked databases, including hundreds of millions of account credentials, credit card numbers, and banking account and routing information.
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromWIRED
1 month ago

ICE and CBP's Face-Recognition App Can't Actually Verify Who People Are

Mobile Fortify, now used by United States immigration agents in towns and cities across the US, is not designed to reliably identify people in the streets and was deployed without the scrutiny that has historically governed the rollout of technologies that impact people's privacy, according to records reviewed by WIRED. The Department of Homeland Security launched Mobile Fortify in the spring of 2025 to "determine or verify" the identities of individuals stopped or detained by DHS officers during federal operations, records show.
Privacy technologies
fromwww.bostonherald.com
2 months ago

A man impersonating an FBI agent tried to get Luigi Mangione out of jail, authorities say

A man falsely claiming to be an FBI agent showed up to a federal jail in New York City on Wednesday night and told officers he had a court order to release Luigi Mangione, authorities said. Mark Anderson, 36, of Mankato, Minnesota, was arrested and charged with impersonating an FBI agent in a foiled bid to free Mangione from the Metropolitan Detention Center,
US news
Information security
fromTechRepublic
1 month ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
Law
fromwww.scientificamerican.com
2 months ago

Video evidence and eye witness accounts: The science behind why people see different things

The same police dashcam footage of a 2007 high-speed chase and collision produced sharply different interpretations, culminating in the Supreme Court ruling for the officer.
fromVulture
1 month ago

California Man Arrested for Sending a Fake Ransom Text to Guthrie Family

Pima County police shared that one arrest has been made in relation to the disappearance of Nancy Guthrie, Savannah Guthrie's mother. On February 5, the FBI arrested Derrick Callella for sending ransom texts asking for bitcoin to the Guthrie family. The FBI traced the phone number from the text message to Torrance, California, where he was arrested. "My next message is to those impostors who are trying to take advantage and profit from this situation. We will investigate and ensure you are held accountable for your actions," FBI agent Heith Janke shared during the press conference on February 5.
US news
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
Information security
fromTheregister
1 month ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
Information security
fromArs Technica
2 months ago

Site catering to online criminals has been seized by the FBI

The FBI seized RAMP, a major Russian-language ransomware marketplace with over 14,000 vetted users, disrupting a significant cybercrime forum and its operations.
fromThe Hacker News
2 months ago

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

Silent Push said it discovered the campaign after analyzing a suspicious domain linked to a now-sanctioned bulletproof hosting provider Stark Industries (and its parent company PQ.Hosting), which has since rebranded to THE[.]Hosting, under the control of the Dutch entity WorkTitans B.V., is a sanctions evasion measure. The domain in question, cdn-cookie[.]com, has been found to host highly obfuscated JavaScript payloads (e.g., "recorder.js" or "tab-gtm.js") that are loaded by web shops to facilitate credit card skimming.
Information security
Information security
fromSecurityWeek
2 months ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
[ Load more ]