HackDig : Dig high-quality web security articles for hackers

Anatomy of a survey scam – how innocent questions can rip you off

byPaul DucklinWe’ve been receiving loads of survey scam emails lately – and you probably get heaps of these, too.So we thought we’d take you through a recent scam from go to woe, with screenshots to document the path that the crooks lured us along.Sometimes, a picture is worth 1000 words (or 1024 words, if you are accustomed to binary numbe
Publish At:2020-06-22 13:39 | Read:152 | Comments:0 | Tags:Uncategorized fraud phising Scam Survey

Experian, Equifax, TransUnion team up to offer weekly free credit report

The Covid-19 crisis has sparkled a rise in identity theft crimes and has drastically increased the demand for credit monitoring. Hackers have been actively exploiting the confusion around the stimulus checks, the enormous amount of unemployed people across the USA applying for benefits, and the fact that millions of people were forced to start working from h
Publish At:2020-06-22 07:23 | Read:157 | Comments:0 | Tags:Mobile News Security credit fraud hacking

Crypto founder admits $25 million ICO backed by celebrities was a scam

byLisa VaasThe Miami-based cryptocurrency firm Centra Tech was built on fairy dust and paid celebrity hoo-ha, but co-founder Robert Joseph Farkas is going to be doing real time in a real prison for the $25 million initial coin offering (ICO) rip-off.An ICO is an unregulated fundraising technique with a dodgy reputation that’s used by blockchain compani
Publish At:2020-06-18 09:16 | Read:95 | Comments:0 | Tags:Cryptocurrency Law & order Centra crypto founder digital cur

A week in security (May 25 – 31)

Last week on Malwarebytes Labs, we published our most recent episode of our podcast Lock and Code, providing an in-depth discussion on web browser privacy, looked at the membership bump for the Coalition against Stalkerware, and dug into EDR solutions. We also looked at twists added to the threat scene by Maze Ransomware. Other cybersecurity news Breac
Publish At:2020-06-01 13:35 | Read:130 | Comments:0 | Tags:A week in security awis cybrsecurity fake fake news fraud ma

RevenueWire to pay $6.7 million to settle FTC charges

What can you do as a scammer when no legitimate payment provider wants to process your payments anymore? Or, what if you are growing sick and tired of these same payment providers reimbursing disgruntled customers who claim that your products didn’t fix computers, like—you know—you said they would? Simple. You rely on some novel help. That is, unti
Publish At:2020-05-18 13:42 | Read:201 | Comments:0 | Tags:Tech support scams browlock fake online scanners fraud FTC p

New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

Since the World Health Organization (WHO) declared the COVID-19 outbreak a pandemic on March 11, IBM X-Force has observed a more than 6,000 percent increase in COVID-19-related spam, with lures ranging the full gamut of challenges and concerns facing individuals — from phishing emails impersonating the Small Business Administration (SBA) and the WHO to U.S.
Publish At:2020-05-03 08:13 | Read:264 | Comments:0 | Tags:Advanced Threats Banking & Financial Services Fraud Protecti

TrickBot Campaigns Targeting Users via Department of Labor FMLA Spam

IBM X-Force monitors billions of spam emails a year, mapping trending, malicious campaigns and their origins. Recent analysis from our spam traps uncovered a new Trickbot campaign that currently targets email recipients with fake messages purporting to come from the U.S. Department of Labor (DoL). The spam leverages the Family and Medical Leave Act (FMLA), w
Publish At:2020-05-03 08:13 | Read:422 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Cybercrime Fraud

Facebook to alert us if we’ve been exposed to fake coronavirus news

byLisa VaasHas somebody on Facebook tried to convince you that drinking bleach cures COVID-19?If you’ve had that kind of dangerous misinformation coughed up at you on the platform and have liked, reacted or commented on it, expect to start seeing messages in your newsfeed alerting you and letting you know that Facebook has since removed the effluvium.O
Publish At:2020-04-21 07:38 | Read:579 | Comments:0 | Tags:Facebook Fake news Social networks coronavirus COVID-19 fact

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

IBM X-Force researchers recently analyzed an Android malware app that’s likely being pushed to infected users by the TrickBot Trojan. This app, dubbed “TrickMo” by our team, is designed to bypass strong authentication methods that bank customers use when they need to authorize a transaction. Though it’s not the first of its kind, this
Publish At:2020-03-24 07:55 | Read:416 | Comments:0 | Tags:Advanced Threats Risk Management Threat Intelligence Android

2020 Tax Fraud Trends: How to Protect Yourself at Home and Work

The tax season deadline in the U.S. is April 15, 2020, and that means scammers are officially on the prowl for unsuspecting tax fraud victims. Attackers are utilizing both time-tested and new techniques to collect tax information and personal data from victims and target individual and corporate accounts. No one is immune from tax season risks, and most of u
Publish At:2020-03-17 10:37 | Read:593 | Comments:0 | Tags:Fraud Protection Bank Fraud Email Fraud Fraud Schemes Identi

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

The video gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies to gaming companies, the games themselves and the user base that enjoys them. Integration of the cloud, mobile apps and social networks, the diversity of games and platforms, th
Publish At:2020-03-16 10:45 | Read:568 | Comments:0 | Tags:Application Security Software & App Vulnerabilities Threat I

A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational context of the interaction. The definition of identity also depends on the context of the medium within which it is exchanged. In the physical world, when we talk about
Publish At:2020-03-13 07:59 | Read:697 | Comments:0 | Tags:Identity & Access Collaboration Compliance Customer Experien

From Nigerian Princes to Bitcoin Trading: Online Scams Have Come a Long Way

It would be a challenge to find someone who has not heard of the now-infamous “Nigerian Prince scams,” also known as “419 scams” and “advance-fee scams.” The concept itself dates back to the French Revolution, but it has come a long way due to human gullibility. More recently, it has taken to the internet to deceive scores
Publish At:2020-03-09 07:28 | Read:527 | Comments:0 | Tags:Fraud Protection Bitcoin Cryptocurrency Fraud Malicious Doma

Child identity theft, part 1: On familiar fraud

In 2013, 19-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died. “What the hell were you thinking?” he screamed. He had just unearthed a credit card statement in her name that had run over its limit from a box of her mother’s paperwork. Betz-Hamilton reasoned that the statement m
Publish At:2020-03-03 17:24 | Read:684 | Comments:0 | Tags:Awareness child identity fraud child identity theft cyberbul

CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil

The malware discussed in this blog saw input from X-Force researchers Andre Piva and Ofir Ozer. It was initially described in a blog post by X-Force’s Maor Wiesen and Limor Kessem. The IBM Trusteer cybercrime research labs specialize in the detection and counteraction of the crimeware and attacks operated by organized cybercrime gangs. In one of our re
Publish At:2020-02-09 10:30 | Read:468 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Bankin

Announce

Share high-quality web security related articles with you:)

Tools