Remove 2017 Remove Cybercrime Remove Scams Remove Social Engineering
article thumbnail

Mastermind: Social Engineering, BEC Attacks, Millions in Cash and Crypto

SecureWorld News

That's because Ghaleb Alaumary motivated teams of criminals to commit cybercrime, financial crime, and to collectively steal tens of millions of dollars. Cybercrime ringleader confesses to conspiracies. Business email compromise scheme and social engineering. Social engineering—in person—was the next part of the scheme.

article thumbnail

TrickBot indictment reveals the scale and complexity of organized cybercrime

Malwarebytes

A Latvian woman has been charged for their alleged role in a transnational cybercrime organisation. Money mules and spear phishing are thrown into the mix alongside social engineering and international theft of money, personal, and confidential information. Big scams, big numbers. What happened this week, you ask?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital artists meet scam artists, as criminals pounce on NFT craze

SC Magazine

No wonder scam artists are taking notice and jumping on the bandwagon. Shashi Prakash, chief technology officer and chief scientist at Bolster, told SC Media that NFTs are especially ripe for scamming right now because of the very fact that some people are chasing this fad without really understanding how the process works.

Scams 137
article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Cybercrime is a growth industry like no other. According to statistics from the FBI’s 2021 Internet Crime Report , complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. Finance and insurance companies were particularly vulnerable to the sort of phishing scams we’re talking about. Social Tactics.

article thumbnail

Voice Phishers Targeting Corporate VPNs

Krebs on Security

Allen said a typical voice phishing or “vishing” attack by this group involves at least two perpetrators: One who is social engineering the target over the phone, and another co-conspirator who takes any credentials entered at the phishing page and quickly uses them to log in to the target company’s VPN platform in real-time.

Phishing 357
article thumbnail

Top 8 Cybersecurity Podcasts of 2021

eSecurity Planet

Since 2017, host Jack Rhysider has investigated some of the most noteworthy stories related to the darkside of the internet, specifically hacking, data breaches, and cybercrime. Through interviews and research, Ran connects the dots between the early days of cybercrime and today’s stories of data hacks and breaches.

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

These developments would have, over the next decade or so, steadily and materially reduced society’s general exposure to cybercrime and online privacy abuses. So as of a few months ago, the US now requires data containerization along much the same lines as Saudi Arabia and the UAE first mandated in 2017.