Remove Consumer Protection Remove Mobile Remove Scams
article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations.   Business Email Compromise (BEC) scams :  BEC scams  require an attacker to pretend to be a company employee, contractor, or service provider.

Passwords 101
article thumbnail

2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope

SecureWorld News

and its allies must keep up; GenAI; mobile threats; RaaS makes it easier for the bad actors; non-human identity management; OT, IoT, and IIoT security and threats; cyber resiliency; SOC models; and improving cybersecurity education and programming. Growing patchwork of U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations.   Business Email Compromise (BEC) scams :  BEC scams  require an attacker to pretend to be a company employee, contractor, or service provider.

Passwords 106
article thumbnail

‘Car crash victim’ calls mother for help and $15K bail money. But it’s an AI voice scam

Malwarebytes

A woman in Florida was tricked into giving thousands of dollars to a scammer after her daughter’s voice was AI-cloned and used in a scam. AI-powered phone scams can range from brief, scripted robocalls to full conversations. Every report helps track and prevent future scams, and you may even help catch one of these criminals.

Scams 97
article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 363
article thumbnail

Utility scams update

Malwarebytes

Utility-based ads targeting mobile phones It only took us 15 minutes to find about a dozen fraudulent ads on Google related to utility bills. This campaign is targeting mobile devices only, as far as we can tell, and U.S. In addition, we can see that miscreants are trying to legitimize their operations by creating fake U.S.-based

Scams 130
article thumbnail

Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web

Security Affairs

Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. Later, cybercriminals successfully applied the same approach to mobile devices, because modern digital payments are extremely interconnected when it comes to mobile applications used by consumers. .

Mobile 111