Remove Blog Remove Data collection Remove Identity Theft Remove Social Engineering
article thumbnail

Doxing in the corporate sector

SecureList

During these conversations, cybercriminals employed social engineering techniques to gain access not only to the internal network of the company, but also to tools that enabled them to manage Twitter user accounts. More details about this incident can be found in the Twitter company blog. Identity theft.

article thumbnail

Privacy predictions 2023

SecureList

On the other hand, we saw the repeal of Roe vs Wade and the subsequent controversy surrounding female reproductive health data in the US as well as investigations into companies selling fine-grained commercial data and facial recognition services to law enforcement. One way to do that might be to insure yourself against data breaches.

Insurance 118
article thumbnail

Spam and phishing in 2022

SecureList

The scheme likely aimed at identity theft: the illegal use of others’ personal details for deriving profit. The cybercrooks might also use the data to contact their victims later, staging a more convincing swindle. Scammers created a page on the telegra.ph

Phishing 102