#phone-blagging

[ follow ]
Parenting
fromSlate Magazine
4 hours ago

My Mom Got a Call That I Was in a Horrific Accident. What She Did Next Can't Be Undone.

Scammers exploit emotional vulnerabilities, making it crucial to educate and protect against future scams.
#data-privacy
Privacy professionals
fromenglish.elpais.com
6 days ago

This is how the illegal market for buying and selling personal data on Telegram works

Illicit data markets on Telegram in Latin America expose personal data, contributing to gender-based violence and highlighting vulnerabilities in government data management.
Privacy professionals
fromenglish.elpais.com
6 days ago

This is how the illegal market for buying and selling personal data on Telegram works

Illicit data markets on Telegram in Latin America expose personal data, contributing to gender-based violence and highlighting vulnerabilities in government data management.
#malware
Information security
fromThe Hacker News
6 hours ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
#ai
Privacy technologies
fromComputerWeekly.com
21 hours ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromHarvard Business Review
4 days ago
Artificial intelligence

AI Agents Act a Lot Like Malware. Here's How to Contain the Risks.

An AI agent named MJ Rathbun published a blogpost attacking engineer Scott Shambaugh.
Privacy technologies
fromComputerWeekly.com
21 hours ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
US politics
fromTechCrunch
1 day ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
NYC politics
fromHoodline
2 days ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
Psychology
fromPsychology Today
3 days ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
Wearables
fromMakeUseOf
3 days ago

Your phone's Bluetooth is broadcasting more than you think - here's how to limit it

Bluetooth remains active and broadcasts data even when not connected, potentially allowing for tracking without user consent.
Digital life
fromBig Think
3 days ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
UK politics
fromwww.independent.co.uk
4 days ago

Less than one per cent of phone theft cases lead to a criminal charge, figures show

Fewer than 1% of mobile phone thefts lead to charges, with 95% of cases closed by the Met Police without identifying a suspect.
Mental health
fromBustle
3 days ago

If You Hate Making Phone Calls, This One's For You

Phone anxiety is a real issue affecting many, causing physical and psychological symptoms that can hinder communication.
Careers
fromZDNET
4 days ago

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Remote teams
fromTheregister
4 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
Photography
fromWIRED
5 days ago

Your Photos Are Probably Giving Away Your Location. Here's How to Stop That

Photos contain metadata like EXIF data, including location, which can be useful but may compromise privacy when shared.
#data-breach
#cybersecurity
fromThe Hacker News
1 day ago
Information security

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

Information security
fromThe Hacker News
4 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromSecurityWeek
4 days ago

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit

Star Blizzard, a Russian hacking group, is using the DarkSword iOS exploit kit in a new campaign targeting Apple devices and iCloud accounts.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromComputerWeekly.com
1 day ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
2 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
3 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Information security
fromThe Hacker News
4 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromSecurityWeek
4 days ago

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit

Star Blizzard, a Russian hacking group, is using the DarkSword iOS exploit kit in a new campaign targeting Apple devices and iCloud accounts.
Cryptocurrency
fromCointelegraph
1 week ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
fromMedium
4 days ago

The long and short of telephone progress

In 1952, Japanese technologist Masaru Ibuka learned that Western Electric was releasing its transistor patents to the public for $25,000, a significant investment for his struggling firm. This opportunity would allow access to essential patent portfolios and technical information, crucial for innovation in electronics.
Intellectual property law
Psychology
fromSilicon Canals
5 days ago

Psychology says people who prefer texting to phone calls aren't being antisocial - they're protecting the quality of their thinking from the demands of real-time performance - Silicon Canals

Preference for texting is often a form of cognitive self-preservation rather than avoidance of communication.
Digital life
fromTODAY.com
6 days ago

Send This to Your Boomer Parents: Avoid AI Scams With 1 Trick From a Deepfake Expert

Artificial intelligence is rapidly improving at creating realistic fake media, leading to increased vulnerability to scams, especially among older adults.
#whatsapp
fromTechCrunch
1 day ago
Privacy professionals

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

Privacy professionals
fromTechCrunch
1 day ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
2 days ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
Information security
fromFortune
1 day ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Privacy technologies
fromZDNET
1 week ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
UK politics
fromwww.independent.co.uk
1 week ago

Morgan McSweeney's 999 call transcript to report phone theft published

The Independent provides critical journalism on key issues without paywalls, relying on donations to support reporting.
Media industry
fromPsychology Today
2 weeks ago

Build Your Digital Detective Kit

Digital and media literacy skills are essential for all online users to navigate AI-generated content, partisan framing, and viral misinformation in today's information landscape.
Business intelligence
fromComputerWeekly.com
2 weeks ago

AI tools offer 'near-real-time' analysis of data from seized mobile phones and computers | Computer Weekly

Cellebrite's AI-powered Guardian Investigate platform enables police to rapidly analyze mobile device data, discover connections between datasets, track phone locations over time, and construct event timelines for major crime investigations.
Artificial intelligence
fromInfoQ
6 days ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
#phishing
Information security
fromTechzine Global
4 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
2 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
3 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromTechzine Global
4 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy technologies
fromTechRepublic
2 weeks ago

Truecaller Gives Families a Way to Stop Scam Calls Remotely - TechRepublic

Truecaller's Family Protection feature enables designated family members to remotely manage scam call defenses for up to five people, including the ability to end suspected fraud calls in real-time on Android devices.
#malvertising
Marketing tech
fromComputerworld
4 weeks ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Marketing tech
fromComputerworld
4 weeks ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Roam Research
fromwww.telecompetitor.com
3 weeks ago

Robocalls continue to decline, sort of: Report

Robocalls in February 2026 totaled 3.8 billion, down 1.3% from January and 14% from February 2025, though daily volume increased due to fewer calendar days.
#online-scams
Privacy professionals
fromThe Mercury News
4 weeks ago

Larry Magid: Beware of online scams

Americans lost at least $16.6 billion to scams in 2024, with older adults over 60 losing more than $4.8 billion, primarily through phishing and romance scams that exploit trust and technology unfamiliarity.
Privacy professionals
fromThe Mercury News
4 weeks ago

Larry Magid: Beware of online scams

Americans lost at least $16.6 billion to scams in 2024, with older adults over 60 losing more than $4.8 billion, primarily through phishing and romance scams that exploit trust and technology unfamiliarity.
Information security
fromSecurityWeek
3 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Artificial intelligence
fromThe Hacker News
3 weeks ago

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

AI-powered agentic web browsers can be manipulated through their reasoning processes to bypass security measures and fall victim to phishing attacks within minutes.
Privacy technologies
fromTheregister
3 weeks ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#cybercrime
Privacy professionals
fromthenextweb.com
3 weeks ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromthenextweb.com
3 weeks ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromComputerworld
2 weeks ago

Cyber criminals too are working from home... your home

The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
Privacy technologies
fromZDNET
1 month ago

Is that message spam or real? This Android trick helps you ID the scams

Android's Circle to Search feature uses AI to identify scam messages by analyzing their content and alerting users to potential fraud.
Information security
fromTheregister
1 week ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Information security
fromThe Hacker News
6 days ago

TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Russian state-sponsored group TA446 is using the DarkSword exploit kit to target iOS devices through phishing emails.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Information security
fromSecurityWeek
6 days ago

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

macOS users are targeted by a ClickFix campaign delivering a Python-based information stealer through a fake Cloudflare verification page.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
UK news
fromwww.bbc.com
1 month ago

'He sent me reams of naked photos': Victims of cyberflasher speak out

A prominent violinist used social media to repeatedly send explicit sexual images and videos to multiple female musicians, causing serious distress and harassment.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
fromSilicon Canals
2 months ago

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Last month, I sat across from one of the brightest people I know as he explained how he'd lost nearly everything to a sophisticated scam. This wasn't some naive teenager or technophobe. This was my friend from university days, a retired executive who'd navigated corporate politics for decades and made shrewd investment decisions his whole life. Watching him piece together how it happened was like watching someone solve a puzzle in reverse.
Psychology
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromSecurityWeek
2 weeks ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
fromABC11 Raleigh-Durham
3 weeks ago

Do you tap to pay? 'Ghost tapping' scams could target your money

The ease of use means the ease of stealing. There are pieces of software and devices that are doing exactly the same thing that a point of sale does and it's transacting on your phone or on your credit card and if you don't have a thumbprint or a biometric on your phone, they can walk up and if you're not paying attention in a crowded area, they get close enough and they touch your phone they can do a transaction.
Information security
Information security
fromSecurityWeek
3 weeks ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
fromArs Technica
2 months ago

Millions of people imperiled through sign-in links sent by SMS

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords-and for users to create and enter them-many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.
Privacy technologies
fromPCWorld
3 weeks ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
fromTelecompetitor
2 months ago

Robocall volume shows little sign of decreasing: Report

Over the past five years, annual robocall volume has consistently remained between approximately 50 billion and 55 billion, according to the YouMail Robocall Index. Robocall volume for 2025 totaled 52.5 billion, down a little over 1% from the 2024 total of 52.8 billion. December's 4.1 billion robocalls were up 6.4% from November but down 5.7% from December 2024. YouMail noted that robocalls increased in November and December 2025 after reaching a multi-year low in October.
Privacy technologies
Privacy professionals
fromSlate Magazine
1 month ago

Help! We Just Dodged an Obvious Scam Call. But One Thing the Scammer Said Has Us Extremely Worried.

A man is falsely credited as the named creator of an Islamophobic book under his name, risking career and reputation; he seeks removal.
#phishing-as-a-service
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
Information security
fromTechRepublic
1 month ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
fromZDNET
1 month ago

Why scammers call you and say nothing - and how to respond safely

Calls where no one responds are rarely accidental. In many cases, they are automated reconnaissance events. Fraud operations run at industrial scale, and before they invest human effort in a target, they validate that a number is active and answered by a real person.
Information security
Information security
fromSecurityWeek
1 month ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
Information security
fromTravel + Leisure
1 month ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
fromSilicon Canals
1 month ago

The phone call scam targeting grandparents that sounds so real even cautious people fall for it - Silicon Canals

The phone rings at 2:47 AM. Your heart pounds as you fumble for the receiver. "Grandma?" The voice is shaky, desperate. "I'm in trouble. I got arrested. Please don't tell Mom and Dad." The voice sounds just like your grandson. He uses the nickname only family knows. He remembers that trip you took together last summer. Everything about this call feels real because, in many ways, it is.
Information security
Information security
fromSecuritymagazine
2 months ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
Information security
fromTheregister
1 month ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
Information security
fromSecurityWeek
1 month ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
[ Load more ]