Remove CISO Remove Identity Theft Remove Scams
article thumbnail

Scammers Exploit Canada Post Strike with Fraud Campaigns

SecureWorld News

Canadians are facing a surge in scams as fraudsters exploit confusion around the Canada Post strike to target individuals with phishing, smishing, and deepfake scams. According to Octavia Howell, CISO at Equifax Canada, there has been an "exponential" rise in fraud attempts, particularly during the strike and the busy holiday season.

Scams 104
article thumbnail

Impersonating Executives’ LinkedIn Profiles Presents a Significant Challenge for CISOs

Security Boulevard

LinkedIn scams that target the public accounts of executives are on the rise and contributed to more than 40% of all phishing and social media cyber incidents in the second quarter of 2022. The post Impersonating Executives’ LinkedIn Profiles Presents a Significant Challenge for CISOs appeared first on Security Boulevard.

CISO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia Recorded the Highest Rate of iOS & Android App Threats

Appknox

More threats were detected on iOS than Android devices; 68% of Australian CISOs expect their organization to suffer a material cyber-attack within the next year. Apple iOS users often fall prey to mobile scams; around 30.1% Unidentified attackers are on the prowl, targeting unsuspecting users with easy scams.

article thumbnail

For Whom the Dell Tolls: Data Breach Affects 49 Million Customers

SecureWorld News

However, you should always keep in mind these tips to help avoid tech support phone scams. Agnidipta Sarkar, Vice President, CISO Advisory, at ColorTokens: "Because the data supposedly contains information about systems purchased from Dell between 2017-2024, and it contains personal information such as full names, addresses, cities, etc.,

article thumbnail

LinkedIn Hack is Scraped Data, Company Claims

eSecurity Planet

What’s more, Hodson observed, the email addresses and phone numbers in the leak can easily be leveraged for email or phone scams, spam campaigns, and identity theft. “Brute force attacks are also something that LinkedIn users affected by the leak will need to be aware of,” Hodson added.

Hacking 115
article thumbnail

Episode 212: China’s Stolen Data Economy (And Why We Should Care)

The Security Ledger

In this episode of the podcast (#212), Brandon Hoffman, the CISO of Intel 471 joins us to discuss that company’s latest report that looks at China’s diversified marketplace for stolen data and stolen identities. That way you can have a better chance that whatever scam you’re trying to run has success.” Read the whole entry. »

CISO 52
article thumbnail

Cyber nonprofits ask billionaire philanthropists to show them some love

SC Magazine

When people come to us looking for help, one of the number one places they say they were scammed was on social media. These includes finance, education and social media giants. Social media… is one of the largest threat vectors,” said Judge. So there is a large role for social media to play in this space.”.