#wallet-theft

[ follow ]
#north-korea
Cryptocurrency
fromSecurityWeek
2 days ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

A North Korean threat actor executed a $285 million heist from the Drift DeFi platform using sophisticated techniques and pre-signed transactions.
Cryptocurrency
fromSecurityWeek
2 days ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

A North Korean threat actor executed a $285 million heist from the Drift DeFi platform using sophisticated techniques and pre-signed transactions.
US politics
fromArs Technica
8 hours ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
Information security
fromnews.bitcoin.com
1 day ago

SEC Warns Fake Officials Exploit Trust With Fraud Tactics Targeting Investors

Impersonation scams using SEC branding are increasing, exploiting investor trust through social media and text messages.
US news
fromsfist.com
1 day ago

Three Tennessee Men Arrested In Connection With Crypto Heist Near Dolores Park

Three men have been arrested for a series of violent crypto thefts on the West Coast, including a $13 million robbery in San Francisco.
Deliverability
fromnews.bitcoin.com
10 hours ago

Dmail Network to Cease Operations Following Five Years of Service

Dmail Network will permanently shut down its services on May 15, 2026, due to unsustainable infrastructure costs and a failed economic model.
EU data protection
fromEngadget
1 day ago

Ireland is testing out a digital wallet that conducts age verification for social media users

Ireland is trialing a Government Digital Wallet to verify user age for social media access, aiming for user-friendly design before its 2026 EU deadline.
#ai
fromnews.bitcoin.com
1 day ago
Privacy technologies

Ethereum's Vitalik Buterin Warns Against AI Agent Security Risks, Shares His Private LLM Stack

Vitalik Buterin has transitioned to a fully local AI setup, citing security concerns with cloud AI services.
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy technologies
fromnews.bitcoin.com
1 day ago

Ethereum's Vitalik Buterin Warns Against AI Agent Security Risks, Shares His Private LLM Stack

Vitalik Buterin has transitioned to a fully local AI setup, citing security concerns with cloud AI services.
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
France news
fromAxios
1 day ago

Priceless items are easy to steal. They're increasingly harder to sell.

Thieves stole three valuable paintings from a small Italian museum in a quick smash-and-grab operation.
Privacy professionals
fromSilicon Canals
2 days ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
#cybersecurity
fromFortune
3 days ago
NYC startup

Latest crypto hack sees thieves make off with $280 million from Solana DeFi platform Drift | Fortune

fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

NYC startup
fromFortune
3 days ago

Latest crypto hack sees thieves make off with $280 million from Solana DeFi platform Drift | Fortune

Drift suffered a $280 million hack attributed to North Korea, utilizing a novel attack method involving durable nonces.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Apple
fromMail Online
2 days ago

Apple issues warning to iPhone users over stealthy attack: Act NOW

Apple has released critical iOS updates to protect against the DarkSword cyberattack method targeting vulnerable devices.
Poker
fromBusiness Matters
4 days ago

Digital Wallets and the Future of Casino Payments in the UK

Digital wallets are preferred for online payments due to their speed, ease of use, and enhanced privacy, especially in casino transactions.
#data-privacy
#openclaw
DevOps
fromInfoWorld
2 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
1 day ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
2 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
1 day ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
fromwww.theguardian.com
3 days ago

World's oldest tortoise caught in viral crypto death scam

Heartbroken to share that our beloved Jonathan, the world's oldest living land animal, has passed away today peacefully on Saint Helena. As his vet for many years, it was an honour to care for him hand-feeding bananas, watching him bask in the sun and marvelling at his quiet wisdom.
Pets
E-Commerce
fromFast Company
3 days ago

Visa says AI could start making purchases for you. Not everyone wants that, but here's how close we are

AI is influencing consumer purchases and acting on behalf of shoppers in commerce.
NYC politics
fromHoodline
4 days ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

US Attorney Connecticut Forfeits $600,000 in Tether Linked to Ledger Phishing Letter

Federal prosecutors recovered over $600,000 in stolen cryptocurrency linked to a phishing scam targeting a hardware wallet user.
Cryptocurrency
fromSecurityWeek
4 days ago

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta was charged with hacking Uranium Finance, stealing over $53 million, and laundering the funds through various transactions.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

US Attorney Connecticut Forfeits $600,000 in Tether Linked to Ledger Phishing Letter

Federal prosecutors recovered over $600,000 in stolen cryptocurrency linked to a phishing scam targeting a hardware wallet user.
Cryptocurrency
fromSecurityWeek
4 days ago

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta was charged with hacking Uranium Finance, stealing over $53 million, and laundering the funds through various transactions.
UK politics
fromwww.independent.co.uk
6 days ago

Less than one per cent of phone theft cases lead to a criminal charge, figures show

Fewer than 1% of mobile phone thefts lead to charges, with 95% of cases closed by the Met Police without identifying a suspect.
#cybercrime
#data-breach
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSecurityWeek
2 days ago

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T-Mobile confirmed a data breach was caused by an insider incident affecting only one account with limited information exposed.
Privacy technologies
fromTechCrunch
3 days ago

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

A publicly accessible Amazon storage server exposed personal data of hundreds of thousands, including driver's licenses and passports, without encryption.
Privacy professionals
fromSilicon Canals
3 days ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Information security
fromSecuritymagazine
2 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSecurityWeek
2 days ago

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T-Mobile confirmed a data breach was caused by an insider incident affecting only one account with limited information exposed.
Privacy technologies
fromTechCrunch
3 days ago

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

A publicly accessible Amazon storage server exposed personal data of hundreds of thousands, including driver's licenses and passports, without encryption.
Privacy professionals
fromSilicon Canals
3 days ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Information security
fromSecuritymagazine
2 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
#phishing
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromThe Hacker News
4 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
5 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromThe Hacker News
4 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
5 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

USDC Freeze Controversy: ZachXBT Says Circle Froze 16 Legitimate Wallets, Missed Real Hacks

ZachXBT identified 15 cases of over $420M in illicit USDC flows that Circle failed to freeze promptly since 2022.
fromnews.bitcoin.com
1 day ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Guy Zyskind emphasized that the whitepaper reframes the conversation around quantum threats, stating that the traditional 10-year migration window now seems dangerously optimistic given Google's findings.
Information security
#bitcoin
Cryptocurrency
fromBitcoin Magazine
3 days ago

Bitcoin Treasury Companies Are Dumping Their Bitcoin

Public companies and sovereign entities are selling bitcoin to address liquidity needs and operational priorities, marking a shift from previous accumulation trends.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Bitcoin Treasury Companies Are Dumping Their Bitcoin

Public companies and sovereign entities are selling bitcoin to address liquidity needs and operational priorities, marking a shift from previous accumulation trends.
#cambodia
Cryptocurrency
fromnews.bitcoin.com
12 hours ago

Cambodian Parliament Approves New Law Imposing Life Sentences for Crypto Scammers

Cambodia's Senate passed a law imposing life sentences for online scam ringleaders, aiming to dismantle illegal operations by April 2026.
Cryptocurrency
fromnews.bitcoin.com
12 hours ago

Cambodian Parliament Approves New Law Imposing Life Sentences for Crypto Scammers

Cambodia's Senate passed a law imposing life sentences for online scam ringleaders, aiming to dismantle illegal operations by April 2026.
#malware
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromThe Hacker News
2 days ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Privacy technologies
fromZDNET
1 week ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
#solana
Information security
fromThe Hacker News
2 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Drift Protocol Hack 2026: What Happened, Who Lost Money, and What's Next

A Solana-based perpetual futures exchange lost $286 million in 12 minutes due to a sophisticated attack involving fake collateral and social engineering.
Information security
fromThe Hacker News
2 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Drift Protocol Hack 2026: What Happened, Who Lost Money, and What's Next

A Solana-based perpetual futures exchange lost $286 million in 12 minutes due to a sophisticated attack involving fake collateral and social engineering.
Privacy professionals
fromZDNET
2 days ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
Information security
fromWIRED
1 day ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
#crypto
Cryptocurrency
fromnews.bitcoin.com
4 days ago

FBI Sting Operation Exposes Crypto Price Rigging Network as 10 Foreign Nationals Charged, Over $1M Seized

Federal crackdown reveals a network of alleged crypto price manipulation, highlighting increased enforcement risks for digital asset firms.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

FBI Sting Operation Exposes Crypto Price Rigging Network as 10 Foreign Nationals Charged, Over $1M Seized

Federal crackdown reveals a network of alleged crypto price manipulation, highlighting increased enforcement risks for digital asset firms.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Warren Presses Commerce Department Over Bitmain Security Risks and Trump-Linked Crypto Ties

Heightened scrutiny over crypto supply chains involves concerns about foreign influence and infrastructure vulnerabilities linked to Bitmain and Eric Trump's ventures.
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Cryptocurrency
fromTechCrunch
3 days ago

De-fi platform Drift suspends deposits and withdrawals after millions in crypto stolen in hack | TechCrunch

Drift has suspended withdrawals and deposits due to a significant security incident involving a potential theft of up to $285 million.
Information security
fromSecurityWeek
2 days ago

React2Shell Exploited in Large-Scale Credential Harvesting Campaign

Threat actor exploits Next.js vulnerabilities to exfiltrate credentials and compromise systems at scale, affecting over 766 systems and collecting more than 10,000 files.
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#blockchain
Cryptocurrency
fromnews.bitcoin.com
2 days ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Kraken User Loses $18.2M in Crypto Social Engineering Attack as Funds Move via Thorchain: ZachXBT

A coordinated theft involved phishing tactics, rapid asset transfers, and laundering of approximately $1.8 million in ether through decentralized protocols.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Kraken User Loses $18.2M in Crypto Social Engineering Attack as Funds Move via Thorchain: ZachXBT

A coordinated theft involved phishing tactics, rapid asset transfers, and laundering of approximately $1.8 million in ether through decentralized protocols.
Information security
fromnews.bitcoin.com
4 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
fromBitcoin Magazine
2 days ago

MARA Conducts Ongoing Layoffs Following $1.1B Bitcoin Sale And Debt Reduction Push

MARA Holdings has begun a series of company-wide layoffs affecting multiple departments, marking the latest shift in the firm's broader restructuring strategy.
Cryptocurrency
fromTearsheet
4 days ago

How Paze is betting bank trust can crack the digital wallet market - Tearsheet

I'm the general manager of Paze, one of the business units of Early Warning Services. The mandate is really to take Paze and bring this new payment checkout system to the masses - both on the consumer side and on the merchant side - really making sure that our goal of becoming one of the top three wallets for checkout in the next five years becomes reality.
Cryptocurrency
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromwww.independent.co.uk
2 months ago

How your entire identity could be sold for 30 on the dark web

British identity packages, including an ID scan, a selfie, and a dossier of personal data, can be purchased by criminals on the dark web for as little as 30, new research suggests. As identity theft continues to rise, experts have discovered the sale of national identity documents, driving licences, credit card details and 2,000 UK frequent traveller passports. The information can be exploited in multiple ways and used to apply for credit cards, mortgages, car loans, or to open bank accounts.
UK news
Cryptocurrency
fromCointelegraph
1 week ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
E-Commerce
fromCointelegraph
2 months ago

How a Third-Party Leak Fueled Phishing Against Ledger Users

A breach at an e-commerce partner can expose customers' order and contact details, enabling highly convincing phishing that leverages real purchase context.
fromBitcoin Magazine
2 weeks ago

Wife Accused Of Spying And Stealing $172M In Bitcoin From Husband

Ping Fai Yuen, a UK resident, held 2,323 Bitcoin in a Trezor hardware wallet in 2023. On Aug. 2 of that year, the full balance was transferred without his knowledge. The funds were later split across 71 separate addresses through a series of transactions. No movement has been recorded since Dec. 21, 2023.
Cryptocurrency
US politics
fromFortune
2 months ago

Mass texts and EZ-Pass phishing: $17 billion stolen in crypto scams, largely by the Chinese | Fortune

Chinese-backed criminal networks use cryptocurrency and advanced techniques to steal an estimated $17 billion from victims, outpacing fragmented government and industry responses.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
#cryptocurrency-theft
Cryptocurrency
fromwww.independent.co.uk
2 weeks ago

Man claims estranged wife filmed passwords to steal 180m of bitcoin'

A businessman alleges his estranged wife secretly filmed him entering bitcoin passwords via hidden CCTV, then stole approximately £180 million in cryptocurrency from his cold wallet.
Cryptocurrency
fromwww.independent.co.uk
2 weeks ago

Man claims estranged wife filmed passwords to steal 180m of bitcoin'

A businessman alleges his estranged wife secretly filmed him entering bitcoin passwords via hidden CCTV, then stole approximately £180 million in cryptocurrency from his cold wallet.
fromABC11 Raleigh-Durham
3 weeks ago

Do you tap to pay? 'Ghost tapping' scams could target your money

The ease of use means the ease of stealing. There are pieces of software and devices that are doing exactly the same thing that a point of sale does and it's transacting on your phone or on your credit card and if you don't have a thumbprint or a biometric on your phone, they can walk up and if you're not paying attention in a crowded area, they get close enough and they touch your phone they can do a transaction.
Information security
#cryptocurrency-fraud
Cryptocurrency
fromCointelegraph
1 month ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust before exploiting victims through fake crypto investment platforms, fundamentally differing from quick-strike phishing attacks.
Cryptocurrency
fromCointelegraph
1 month ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust before exploiting victims through fake crypto investment platforms, fundamentally differing from quick-strike phishing attacks.
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
fromThe Hacker News
1 month ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
[ Load more ]