article thumbnail

The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back

Krebs on Security

In reality, the fraudster initiates a transaction — such as the “forgot password” feature on the financial institution’s site — which is what generates the authentication passcode delivered to the member. The fraudster then uses Zelle to transfer the victim’s funds to others.

Scams 355
article thumbnail

8 Ways to Protect Yourself against Scams on Black Friday and Cyber Monday

Adam Levin

Credit cards come with consumer protections that limit your liability if your card information is stolen. Change your passwords. If you’re using the same password across a number of accounts, you are more vulnerable to cyber criminals. If you’re using a traditional credit card, sign up for transaction alerts. Bottom line.

Scams 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 329
article thumbnail

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

Malwarebytes

Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group using Phoenix CryptoLocker ransomware, issued a legal notice of an information security incident to the Consumer Protection Bureau in New Hampshire.

article thumbnail

What is Maryland’s Online Data Privacy Protection Act?

Centraleyes

Genetic Information Maryland was one of a select group of states that included genetic information in their listing of personal information categories in previous Maryland consumer protection acts. HB962 expands and specifies exactly which types of genetic information are subject to breach notification requirements.

article thumbnail

Common Holiday Scams and How to Avoid Them

Identity IQ

IdentityIQ members reap the benefits of credit monitoring with real-time alerts, dark web and internet monitoring , VPN and antivirus software , identity theft insurance of up to $1 million underwritten by AIG, stolen identity restoration support, and more. Familiarize yourself with common red flags to recognize potential scams.

Scams 52