article thumbnail

LifeLock Bug Exposed Millions of Customer Email Addresses

Krebs on Security

Identity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually exposed customers to additional attacks from ID thieves and phishers. ” LifeLock’s Web site is currently offline.

article thumbnail

Common Holiday Scams and How to Avoid Them

Identity IQ

Phishing emails and links: Phishing emails and links are designed to trick you into revealing personal information or clicking on malicious links that can install malware on your device. Common phishing red flags to look for include typos or low-resolution images. This is a form of phishing scam.

Scams 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We dig into the Game Players Code

Malwarebytes

Malicious ads, fake games, survey scams, phishing attacks…whatever you can think of, it’s in use. INVESTIGATE any gaming-related purchases before handing over money, such as checking whether the website is blacklisted on [link] and only making card payments that offer greater consumer protections. Another decent tip.

article thumbnail

It’s a Holiday Security Breach Blowout

SiteLock

Thankfully, we understand how the breaches may have occurred and how to protect ourselves, which I will share with you now. At a overview level, many large data breaches occur through an attack called spear phishing. Next, use robust authentication practices. Also, turn on two-factor authentication wherever you can.

article thumbnail

The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back

Krebs on Security

Naturally, a great deal of phishing schemes that precede these bank account takeovers begin with a spoofed text message from the target’s bank warning about a suspicious Zelle transfer. An important aspect of this scam is that the fraudsters never even need to know or phish the victim’s password. What’s your username?”

Scams 355
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Viewing these videos, adversaries can begin to compile metadata about an individual’s behaviors preferences – intel that could be applied toward targeting phishing campaigns, according to Setu Kulkarni, vice president of Strategy at WhiteHat Security. “It is deeply invasive for anyone who’s captured on film.”.