#mobile-fraud

[ follow ]
Information security
fromSecurityWeek
2 hours ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
#data-breach
fromwww.housingwire.com
18 hours ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
Privacy technologies
fromMail Online
1 day ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
#fraud
Canada news
fromwww.cbc.ca
12 hours ago

7 charged in scheme that used AI tools to defraud Toronto-area stores: police | CBC News

Seven people have been charged in a fraud investigation involving AI tools used to steal login information from retail employees in Toronto.
NYC startup
fromwww.amny.com
3 days ago

Man stole thousands from delivery workers to invest in bogus delivery app | amNewYork

Mauricio Sevilla pleaded guilty to defrauding food delivery workers out of $7,500 in a fake investment scheme for a non-existent app.
Canada news
fromwww.cbc.ca
12 hours ago

7 charged in scheme that used AI tools to defraud Toronto-area stores: police | CBC News

Seven people have been charged in a fraud investigation involving AI tools used to steal login information from retail employees in Toronto.
NYC startup
fromwww.amny.com
3 days ago

Man stole thousands from delivery workers to invest in bogus delivery app | amNewYork

Mauricio Sevilla pleaded guilty to defrauding food delivery workers out of $7,500 in a fake investment scheme for a non-existent app.
Artificial intelligence
fromTechRepublic
23 hours ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#generative-ai
Marketing tech
fromSFGATE
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Marketing tech
fromSFGATE
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
EU data protection
fromwww.independent.co.uk
23 hours ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
Wearables
fromEngadget
20 hours ago

Sam Altman's 'human verification' company thinks its eye-scanning orbs could solve ticket scalping

Concert Kit uses World ID to help artists combat ticket scalping by verifying real human buyers.
Poker
fromSecurityWeek
1 day ago

Another DraftKings Hacker Sentenced to Prison

Kamerin Stokes was sentenced to 30 months in prison for a credential stuffing attack on DraftKings, involving 60,000 compromised accounts.
#cryptocurrency
France news
fromThe Local France
1 day ago

France reports over 40 cryptocurrency kidnappings so far this year

France has experienced over 40 kidnappings linked to cryptocurrencies since January, targeting wealthy individuals and their families.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Heleket Crypto Payment Processing Platform Brings Low-Fee Transactions to Online Business

Cryptocurrency payment systems like Heleket offer lower fees and faster transactions compared to traditional payment methods.
France news
fromThe Local France
1 day ago

France reports over 40 cryptocurrency kidnappings so far this year

France has experienced over 40 kidnappings linked to cryptocurrencies since January, targeting wealthy individuals and their families.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Heleket Crypto Payment Processing Platform Brings Low-Fee Transactions to Online Business

Cryptocurrency payment systems like Heleket offer lower fees and faster transactions compared to traditional payment methods.
Cryptocurrency
fromBitcoin Magazine
17 hours ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
fromStreetsblog Empire State
1 day ago

Talk About Insurance Fraud! Big Tech Floods Pols' In-Boxes With Fake Emails In Support Of Hochul's Car Premium Ploy - Streetsblog Empire State

Several state lawmakers have reported receiving hundreds of form emails generated by Citizens For Affordable Rates, an organization funded by Uber, supporting Gov. Hochul's auto insurance proposal. One email was sent from Leslie Jenkins, who died in 2015, raising questions about the legitimacy of these communications.
California
#paypal
Venture
from24/7 Wall St.
1 day ago

Mizuho Downgrades PayPal to Neutral Citing X's Threat to Venmo: Is the PYPL Comeback Story Over?

PayPal faces significant competitive challenges, leading to an analyst downgrade and concerns over its long-term growth potential.
Web design
fromTheStreet
3 days ago

PayPal turns Canva designs into payment machines

PayPal Payment Links are now integrated in Canva, allowing instant payments from designs without needing a separate e-commerce platform.
Venture
from24/7 Wall St.
1 day ago

Mizuho Downgrades PayPal to Neutral Citing X's Threat to Venmo: Is the PYPL Comeback Story Over?

PayPal faces significant competitive challenges, leading to an analyst downgrade and concerns over its long-term growth potential.
Web design
fromTheStreet
3 days ago

PayPal turns Canva designs into payment machines

PayPal Payment Links are now integrated in Canva, allowing instant payments from designs without needing a separate e-commerce platform.
Games
fromTechCrunch
3 days ago

How the rewards app Freecash scammed its way to the top of the app stores | TechCrunch

Freecash misled users by promoting itself as a money-making app while harvesting sensitive data.
Deliverability
fromZDNET
3 days ago

This simple email trick saves me from annoying marketing spam (and it's free to do)

Using a dedicated shopping email can effectively reduce spam and clutter in your primary inbox.
fromNature
4 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Digital life
fromwww.dw.com
4 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
European startups
fromTearsheet
4 days ago

How Wise is betting on infrastructure and brand - Tearsheet

Cross-border payments face inefficiencies; Wise aims to streamline this with direct connections to local payment systems.
Information security
fromBusiness Matters
1 day ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Apple
fromMail Online
1 week ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
#privacy
Privacy technologies
fromComputerWeekly.com
21 hours ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromGSMArena.com
2 hours ago

India drops proposal to make smartphone brands pre-install unique ID app Aadhaar on their devices

The Indian government has rejected a proposal to mandate pre-installation of the Aadhaar app on smartphones due to security and cost concerns.
Marketing tech
fromThe Cyber Express
1 day ago

Gemini Ad Safety Targets Surge In AI-Generated Scam Ads

Google's Gemini ad safety systems blocked over 8.3 billion harmful ads in 2025, focusing on early detection and combating AI-generated scams.
Real estate
fromwww.housingwire.com
16 hours ago

Portable credit reports could lower costs, but fraud worries persist

Consumer-controlled portable credit reports could reduce costs and repeat pulls, but may increase fraud risk according to credit reporting advocates.
#age-verification
EU data protection
fromWIRED
1 day ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
1 day ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
1 day ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
1 day ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
#agentic-commerce
fromTearsheet
2 days ago
Artificial intelligence

How American Express is fixing the weak link in agentic commerce - Tearsheet

fromFortune
4 days ago
Artificial intelligence

American Express releases tools to build AI payments-and pledges to pay the price if agents go awry | Fortune

Artificial intelligence
fromTearsheet
2 days ago

How American Express is fixing the weak link in agentic commerce - Tearsheet

Agentic commerce is evolving with AI agents that anticipate user needs, transforming transactions while maintaining user control and trust.
Artificial intelligence
fromFortune
4 days ago

American Express releases tools to build AI payments-and pledges to pay the price if agents go awry | Fortune

Agentic commerce is gaining traction, with American Express introducing a developer kit and purchase protection for AI-driven transactions.
UX design
fromEntrepreneur
1 week ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Web design
fromMiami Herald
3 days ago

PayPal turns Canva designs into payment machines

PayPal's Payment Links feature is now integrated into Canva, allowing users to turn designs into checkout pages seamlessly.
#malware
fromSecurityWeek
3 days ago
Information security

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

Information security
fromSecurityWeek
3 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
Apple
fromTechRepublic
1 week ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
#cybersecurity
fromTechCrunch
19 hours ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Privacy professionals
fromThe Hacker News
2 days ago

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

A bank's Taboola pixel redirected users to a Temu tracking endpoint without consent or security controls detecting the violation.
Information security
fromTechCrunch
19 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
from24/7 Wall St.
2 days ago

Why Cybersecurity Stocks Look Built for the Next Big Spending Cycle

Cybersecurity firms like CrowdStrike and Palo Alto Networks are poised for growth amid rising cyber threats and the emergence of advanced AI technologies.
Information security
fromThe Hacker News
4 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
EU data protection
fromSecurityWeek
1 day ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Canada news
fromThe Walrus
1 week ago

Why Your Credit Card Is a National Security Threat | The Walrus

Canada needs to develop its own digital payment infrastructure to ensure financial autonomy and protect against foreign control.
Artificial intelligence
fromFast Company
2 days ago

The idea that the internet is built for people is crumbling. That has huge implications for your business

The internet is evolving to accommodate software agents that act on behalf of users, changing how websites are designed and interacted with.
Marketing tech
fromSan Diego Union-Tribune
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies to enhance their defenses against these threats.
#ransomware
Privacy professionals
fromFortune
2 days ago

As a small business owner, I never expected to pay $100,000 protecting my business from ransomware | Fortune

Ransomware attacks can severely impact small businesses, leading to significant recovery costs despite having cyber insurance.
Privacy professionals
fromFortune
2 days ago

As a small business owner, I never expected to pay $100,000 protecting my business from ransomware | Fortune

Ransomware attacks can severely impact small businesses, leading to significant recovery costs despite having cyber insurance.
Privacy professionals
fromTechCrunch
2 days ago

Exclusive: Fashion retailer Express left customers' personal data and order details exposed to the internet

Express fixed a security flaw that exposed customer order details and personal information on its website.
Marketing tech
fromThe Cool Down
4 days ago

AI chatbots are subtly trying to make you buy more stuff - here's how to protect yourself

AI can influence consumer purchasing decisions without their awareness, often through subtle persuasion methods.
Privacy professionals
fromZDNET
3 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy technologies
fromwww.bbc.com
19 hours ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
Information security
fromArs Technica
1 day ago

Recent advances push Big Tech closer to the Q-Day danger zone

Organizations are transitioning to new algorithms to replace RSA and elliptic curves due to vulnerabilities exposed by quantum computing threats.
Privacy technologies
from404 Media
1 day ago

App Stores Push Users Toward Nudify Apps, New Research Shows

Google and Apple's app stores actively promote harmful nudify and undress apps, contrary to their stated policies.
Information security
fromThe Hacker News
2 days ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A social engineering campaign exploits Obsidian to distribute PHANTOMPULSE trojan targeting financial and cryptocurrency sectors.
#identity-verification
Information security
fromComputerWeekly.com
1 day ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Information security
fromSecurityWeek
3 days ago

Mirax RAT Targeting Android Users in Europe

A new remote access trojan named Mirax targets Android users in Europe, enabling extensive control and data theft through sophisticated techniques.
Privacy professionals
fromSilicon Canals
2 weeks ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
Information security
fromThe Hacker News
2 days ago

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Threat actors are weaponizing n8n to conduct phishing campaigns and deliver malicious payloads through automated emails.
Information security
fromSecurityWeek
2 days ago

100 Chrome Extensions Steal User Data, Create Backdoor

Over 20,000 users installed malicious Chrome extensions that steal information, provide backdoors, or inject ads, as reported by cybersecurity firm Socket.
Information security
fromTechCrunch
4 days ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Privacy technologies
fromZDNET
3 weeks ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
E-Commerce
fromPractical Ecommerce
2 months ago

The Fraud Hiding in Email Signups

Fake but valid email accounts enable card testing and coupon abuse, causing chargebacks, revenue and inventory loss, and jeopardizing merchant payment relationships.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromTheregister
3 weeks ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
fromABC11 Raleigh-Durham
1 month ago

Do you tap to pay? 'Ghost tapping' scams could target your money

The ease of use means the ease of stealing. There are pieces of software and devices that are doing exactly the same thing that a point of sale does and it's transacting on your phone or on your credit card and if you don't have a thumbprint or a biometric on your phone, they can walk up and if you're not paying attention in a crowded area, they get close enough and they touch your phone they can do a transaction.
Information security
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
fromArs Technica
2 months ago

Millions of people imperiled through sign-in links sent by SMS

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords-and for users to create and enter them-many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.
Privacy technologies
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
[ Load more ]