Remove Accountability Remove Retail Remove Scams Remove Social Engineering
article thumbnail

4 sneaky scams from 2023

Malwarebytes

In 2023, the public primarily confronted two varieties of online scams: the technical and the topical. Technical scams abuse legitimate aspects of modern internet infrastructure to lead users to illegitimate or compromised sites. Topical scams, on the other hand, are simpler. OBN Brandon’s trick is almost always the same.

Scams 85
article thumbnail

Scams 101: All you need to know to protect against online fraud and identity theft

Hot for Security

Internet scams are everywhere, inflicting billions of dollars in reported losses from victims each year. Anyone can fall for online scams, as tactics are tailored to the interests of all age groups. Let’s take a closer look at some of the most common scams: Coronavirus-related scams. IRS and Bank-related scams.

Scams 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

For Cybersecurity, the Tricks Come More Than Once a Year

IT Security Guru

Phishing attacks, malicious links and social engineering are just a few of the tricks used by cybercriminals to obtain credentials and other valuable information. Once you enter your credentials or other sensitive information, the bad actors can use it to access your accounts or steal your identity.

article thumbnail

Black Friday 2021: How to Have a Scam-Free Shopping Day

SecureList

Case in point: we’re already seeing scams targeting World Cup fans more than a year out from the event. Fact 2: the retail sector, particularly e-commerce, has always been popular with cybercriminals. One of the most common scams is to create a fake website offering great deals for popular shopping portals.

Scams 91
article thumbnail

Australia Recorded the Highest Rate of iOS & Android App Threats

Appknox

Apple iOS users often fall prey to mobile scams; around 30.1% Thus, these Australian attacks significantly contribute to the rising trend in socially engineered attacks. The lockdowns have made on-demand retail and mCommerce a permanent fixture among Australian users who share their transaction details without any qualms.

article thumbnail

Business Email Compromise attack imitates vendors, targets supply chains

Malwarebytes

BEC follows a few different patterns, but primarily revolves around an approach by a criminal who has compromised or spoofed an executive-level email account. Some attackers perform reconnaissance in advance so they can target people in HR, finance, or accounts. What we’re looking at below is Vendor Email Compromise (VEC).

article thumbnail

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

The Last Watchdog

In the not-so-distant past, banks dealt with online and account takeover fraud, where hackers stole passwords and used phishing scams to target specific individuals. Security capabilities are branching out beyond mobile banking into corporate cash management applications and retail channels.

Banking 147