Remove Authentication Remove Identity Theft Remove Mobile Remove Scams
article thumbnail

Fortnite Scams: What Parents Need to Know

Identity IQ

Fortnite Scams: What Parents Need to Know IdentityIQ Since the summer of 2017, Fortnite Battle Royale has been one of the most popular games in the world. Unfortunately, offering financial information exposes players to scams, potentially resulting in identity theft. What is a Fortnite Scam? What is a Poison PDF?

Scams 64
article thumbnail

SIM Swap Scams: How SIM Swapping Works and How To Protect Yourself

Identity IQ

SIM Swap Scams: How SIM Swapping Works and How To Protect Yourself IdentityIQ According to the Federal Bureau of Investigation, SIM swap scams are on the rise. If you’re unfamiliar with this scam, it takes advantage of people’s lack of knowledge of how SIM cards work and puts their information at risk.

Scams 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

As Covid-19 Cases Increase, Beware Tracing Scams

Adam Levin

Reveal the identity of the person you are believed to have been in contact with who has tested positive for Covid-19. Ask you to install a third party app to your mobile device. Enable two-factor authentication on your accounts. Keep your mobile apps, your operating systems, and your programs up to date.

Scams 130
article thumbnail

50 Ways to Avoid Getting Scammed on Black Friday

Adam Levin

Here are 50 ways to avoid getting scammed on Black Friday — and beyond. Popular browsers, like Safari or Firefox, frequently issue updates to protect against scams. Enable two-factor authentication. Avoid delivery issue scams by tracking your shipments via confirmation emails or password-protected online accounts.

Scams 243
article thumbnail

Would You Have Fallen for This Phone Scam?

Krebs on Security

You may have heard that today’s phone fraudsters like to use use caller ID spoofing services to make their scam calls seem more believable. Sure enough, he said, as long as he was calling from the number on file for his account, the automated system let him review recent transactions without any further authentication.

Scams 359
article thumbnail

SEC X account hacked to hawk crypto-scams

Malwarebytes

This would suggest the compromise was the result of a SIM swapping attack, where an attacker takes control of a phone number by convincing a mobile carrier to transfer the victim’s phone number to a SIM card they own. X offers other options like an authentication app and a security key. You’re all set.

article thumbnail

What is Phone Cloning?

Identity IQ

Hacking into computers has been a thing for decades, but what do you know about the process of cloning mobile phones? Phone cloning is when an exact replica of a mobile phone is created. This includes copying the international mobile equipment identity (IMEI) number. How Does a Phone Cloning Scam Work?