#impersonations

[ follow ]
#fraud-prevention
Non-profit organizations
fromNextgov.com
4 days ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Non-profit organizations
fromNextgov.com
4 days ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Apple
fromTechRepublic
1 day ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Writing
fromDefector
17 hours ago

Why Would You Ask AI To Tell The Story Of Your Own Life? | Defector

Writing is a challenging profession with many aspiring writers and few opportunities for steady income.
#deepfakes
Law
fromArs Technica
1 day ago

Police corporal created AI porn from driver's license pics

A Pennsylvania state police corporal pleaded guilty to creating over 3,000 pornographic deepfakes and possessing child sexual abuse material.
Law
fromAbove the Law
4 days ago

Deepfakes And The Future Of Litigation: Are We Ready? - Above the Law

Deepfakes will challenge the judicial system, requiring more rigorous evidence authentication and potentially altering courtroom procedures.
Digital life
fromTruthout
2 weeks ago

Deepfakes and AI Misinformation Reshape How War Is Seen Online

Deepfakes and AI-generated misinformation are increasingly prevalent, necessitating Critical Artificial Intelligence Literacy to navigate modern conflicts and information environments.
Law
fromArs Technica
1 day ago

Police corporal created AI porn from driver's license pics

A Pennsylvania state police corporal pleaded guilty to creating over 3,000 pornographic deepfakes and possessing child sexual abuse material.
Law
fromAbove the Law
4 days ago

Deepfakes And The Future Of Litigation: Are We Ready? - Above the Law

Deepfakes will challenge the judicial system, requiring more rigorous evidence authentication and potentially altering courtroom procedures.
Digital life
fromTruthout
2 weeks ago

Deepfakes and AI Misinformation Reshape How War Is Seen Online

Deepfakes and AI-generated misinformation are increasingly prevalent, necessitating Critical Artificial Intelligence Literacy to navigate modern conflicts and information environments.
World news
fromWIRED
1 day ago

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans

Governments struggle to combat industrial-scale scamming operations linked to organized crime, causing billions in losses, particularly affecting foreign victims.
Digital life
fromThe Verge
1 day ago

Google makes it easy to deepfake yourself

YouTube Shorts introduces AI avatars for creators to clone themselves, enhancing content creation while addressing concerns over AI-generated content.
Privacy professionals
fromWIRED
2 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Mental health
fromwww.theguardian.com
4 days ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
#ai-fraud
Information security
fromComputerworld
2 weeks ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromComputerworld
2 weeks ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Privacy technologies
fromArs Technica
2 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
UK news
fromIndependent
2 days ago

Gardai target 'bogus company' linked to Black Axe romance fraud after elderly woman scammed out of six-figure sum

Two men arrested in Clondalkin as part of a crackdown on the Black Axe crime network linked to romance fraud.
UX design
fromEntrepreneur
3 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Marketing tech
fromForbes
3 days ago

4 Ways To Stay Authentic In The Age Of AI

Consumer backlash against AI in advertising stems from a perceived lack of authenticity, not the technology itself.
Canada news
fromThe Walrus
3 days ago

Why Your Credit Card Is a National Security Threat | The Walrus

Canada needs to develop its own digital payment infrastructure to ensure financial autonomy and protect against foreign control.
#ai
Information security
fromFortune
14 hours ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromFortune
14 hours ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromwww.theguardian.com
2 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
US politics
fromwww.theguardian.com
4 days ago

Republicans fooled by AI-generated image of US crew member rescued in Iran

Republican politicians were misled by a fake AI-generated image of a US warplane crew member, highlighting the need for improved media literacy.
Relationships
fromSilicon Canals
6 days ago

Most people don't realize that the dishonest people in their lives rarely lie about facts - they lie about their intentions, and that specific distinction is why you keep feeling confused rather than simply hurt - Silicon Canals

Intention lies involve sharing true facts with hidden motives, making them difficult to detect.
fromwww.theguardian.com
6 days ago

Buying a collectible? Beware fakers out to persuade you it's the real deal

Scams involving antiques and collectibles are almost as old as some of the items. But internet sales now mean fraudsters have a much wider audience.
E-Commerce
#cybersecurity
fromZDNET
13 hours ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromTechSpot
1 day ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

fromTechCrunch
1 day ago
Information security

Hacker stole 700,000 from U.K. energy company by redirecting payment | TechCrunch

fromNextgov.com
4 days ago
Information security

Government official impersonation scam complaints doubled in 2025, FBI report shows

Information security
fromZDNET
13 hours ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
1 day ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromTechCrunch
1 day ago

Hacker stole 700,000 from U.K. energy company by redirecting payment | TechCrunch

Zephyr Energy lost £700,000 due to a hacker redirecting a payment meant for a contractor into a fraudulent account.
Information security
fromThe Hacker News
1 day ago

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

A new threat cluster UAT-10362 targets Taiwanese NGOs and universities with Lua-based malware LucidRook via spear-phishing campaigns.
Information security
fromNextgov.com
4 days ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
Information security
fromArs Technica
2 days ago

Thousands of consumer routers hacked by Russia's military

Russian military hackers are exploiting consumer routers to harvest passwords and credentials for espionage, affecting thousands of devices globally.
#meta
fromTechCrunch
16 hours ago
Social media marketing

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Social media marketing
fromTechCrunch
16 hours ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Apple
fromMail Online
1 day ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
Privacy professionals
fromTechCrunch
2 days ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
Apple
fromTheregister
1 day ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Social media marketing
fromHer Campus
1 day ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Privacy professionals
fromTechCrunch
2 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Cryptocurrency
fromCointelegraph
2 weeks ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Psychology
fromPsychology Today
2 weeks ago

What's Behind the Fake Review

Fake content spreads rapidly due to emotional triggers and biases, necessitating critical thinking over social proof in decision-making.
Digital life
fromTODAY.com
2 weeks ago

Send This to Your Boomer Parents: Avoid AI Scams With 1 Trick From a Deepfake Expert

Artificial intelligence is rapidly improving at creating realistic fake media, leading to increased vulnerability to scams, especially among older adults.
World news
fromThe Cipher Brief
2 weeks ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
Privacy professionals
fromSecuritymagazine
5 days ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Information security
fromThe Hacker News
3 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#cybercrime
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy technologies
fromenglish.elpais.com
4 weeks ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
#identity-management
fromThe Hacker News
2 days ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
3 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
2 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
3 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Artificial intelligence
fromThe Hacker News
1 month ago

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

AI-powered agentic web browsers can be manipulated through their reasoning processes to bypass security measures and fall victim to phishing attacks within minutes.
#phishing
Information security
fromTheregister
3 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
fromThe Hacker News
2 weeks ago
Information security

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromTheregister
3 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromThe Hacker News
2 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromTechCrunch
3 days ago

Russian government hackers broke into thousands of home routers to steal passwords | TechCrunch

Russian hackers hijacked thousands of routers globally to redirect internet traffic and steal passwords and access tokens.
Information security
fromMiami Herald
3 days ago

Maryland AG warns social media users of investment scams

Maryland Attorney General warns of rising fraudulent investment schemes on social media using deceptive tactics and artificial intelligence.
#ai-security
Information security
fromnews.bitcoin.com
5 days ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Information security
fromSecurityWeek
4 days ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can exploit AI agents, leading to manipulation and unexpected behaviors through various attack types identified by researchers.
Information security
fromnews.bitcoin.com
5 days ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Information security
fromSecurityWeek
1 week ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
fromwww.independent.co.uk
2 months ago

How your entire identity could be sold for 30 on the dark web

British identity packages, including an ID scan, a selfie, and a dossier of personal data, can be purchased by criminals on the dark web for as little as 30, new research suggests. As identity theft continues to rise, experts have discovered the sale of national identity documents, driving licences, credit card details and 2,000 UK frequent traveller passports. The information can be exploited in multiple ways and used to apply for credit cards, mortgages, car loans, or to open bank accounts.
UK news
#social-engineering
fromSilicon Canals
2 months ago
Psychology

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

fromSilicon Canals
2 months ago
Psychology

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Information security
fromTheregister
2 weeks ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
fromwww.theguardian.com
2 months ago

Deepfake fraud taking place on an industrial scale, study finds

Tools to create tailored, even personalised, scams leveraging, for example, deepfake videos of Swedish journalists or the president of Cyprus are no longer niche, but inexpensive and easy to deploy at scale, said the analysis from the AI Incident Database. It catalogued more than a dozen recent examples of impersonation for profit, including a deepfake video of Western Australia's premier, Robert Cook, hawking an investment scheme, and deepfake doctors promoting skin creams.
Artificial intelligence
Information security
fromTechzine Global
3 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Artificial intelligence
fromPsychology Today
2 months ago

Fake News, A.I. Deepfakes, and the Pageant of the Unreal

Modern technologies, especially AI, enable large-scale fabrication of truth, increasing misinformation and facilitating AI-powered propaganda that manipulates human beliefs and behavior.
Information security
fromSecurityWeek
3 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
fromhttps://www.wbrc.com
1 month ago

Woman loses Facebook business account to person posing as social media influencer

"The buttons that he's telling me to push are not there. I don't use Zoom often so I'm feeling frustrated thinking that I don't know what I'm doing. He's getting frustrated, and he says, 'OK, let's just switch the Zoom call to your phone,'" Stotts said.
Privacy professionals
Information security
fromSecurityWeek
1 month ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
fromPCWorld
1 month ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
fromTechzine Global
1 month ago

How phishing service Tycoon 2FA went under

Tycoon 2FA, a Phishing-as-a-Service (PhaaS) platform, enabled thousands of cybercriminals to steal login credentials and session tokens. Even accounts secured with MFA could be compromised via a single email. The service had been active since at least 2023 and quickly grew to become one of the most widely used phishing platforms in the world.
Information security
fromTechCrunch
1 month ago

FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach | TechCrunch

Impostors are impersonating our reporters to extract sensitive business information from unsuspecting targets. In several cases we know about, scammers have adopted the identity of actual staff members, crafting what looks like a standard media inquiry about a company's products and requesting an introductory call.
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromwww.bbc.com
1 month ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Information security
fromTechRepublic
1 month ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
Information security
fromSecuritymagazine
2 months ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
Information security
fromSecurityWeek
2 months ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
fromwww.theguardian.com
2 months ago

Millions creating deepfake nudes on Telegram as AI tools drive global wave of digital abuse

The Guardian has identified at least 150 Telegram channels large encrypted group chats popular for their secure communication that appear to have users in many countries, from the UK to Brazil, China to Nigeria, Russia to India. Some of them offer nudified photos or videos for a fee: users can upload a photo of any woman, and AI will produce a video of that woman performing sexual acts.
Information security
Information security
fromTheregister
1 month ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
[ Load more ]