Remove how-the-scarcity-principle-is-used-in-online-scams-and
article thumbnail

Scammers Use Breached Personal Details to Persuade Victims

Lenny Zeltser

Scammers use a variety of social engineering tactics when persuading victims to follow the desired course of action. Personalized Porn Extortion Scam. Consider the case of an extortion scam in which the sender claims to have evidence of the victim’s pornography-viewing habits. Data Breach Lawsuit Scam.

Scams 60