#sms-scams

[ follow ]
fromArs Technica
1 day ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
#cybersecurity
Information security
fromSecurityWeek
5 days ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
fromTechSpot
5 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

fromTechCrunch
5 days ago
Information security

Hacker stole 700,000 from U.K. energy company by redirecting payment | TechCrunch

Information security
fromComputerWeekly.com
1 week ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
1 week ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromSecurityWeek
5 days ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
Information security
fromTechSpot
5 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromTechCrunch
5 days ago

Hacker stole 700,000 from U.K. energy company by redirecting payment | TechCrunch

Zephyr Energy lost £700,000 due to a hacker redirecting a payment meant for a contractor into a fraudulent account.
Information security
fromComputerWeekly.com
1 week ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
1 week ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Games
fromTechCrunch
7 hours ago

How the rewards app Freecash scammed its way to the top of the app stores | TechCrunch

Freecash misled users by promoting itself as a money-making app while harvesting sensitive data.
fromThe Hacker News
12 hours ago

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real time, enhancing its operational value significantly.
Roam Research
Apple
fromTechRepublic
5 days ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
World news
fromWIRED
5 days ago

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans

Governments struggle to combat industrial-scale scamming operations linked to organized crime, causing billions in losses, particularly affecting foreign victims.
Privacy professionals
fromMail Online
1 day ago

Warning to iPhone users over iCloud storage scam exposing bank details

A new email scam targets iPhone users, posing as iCloud notifications to steal personal and banking information.
Information security
fromThe Hacker News
8 hours ago

AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

A new ad fraud scheme uses SEO techniques and AI-generated content to deceive users into enabling browser notifications for scams.
Apple
fromMail Online
5 days ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
#phishing
Information security
fromTheregister
1 week ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromThe Hacker News
1 week ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromTechzine Global
14 hours ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromThe Hacker News
1 day ago

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The FBI and Indonesian National Police dismantled a global phishing operation using the W3LL toolkit, preventing over $20 million in fraud.
Privacy technologies
fromTechRepublic
3 weeks ago

Apple Mail's 'Trusted Sender' Label Misused in New Phishing Scheme

Apple Mail's 'trusted sender' label can mislead users, allowing phishing scams to exploit perceived familiarity without verifying sender legitimacy.
Information security
fromTheregister
1 week ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromThe Hacker News
1 week ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Parenting
fromSlate Magazine
1 week ago

My Mom Got a Call That I Was in a Horrific Accident. What She Did Next Can't Be Undone.

Scammers exploit emotional vulnerabilities, making it crucial to educate and protect against future scams.
fromTelecompetitor
4 days ago

Robocalls up month-over-month, down year-over-year: Report

"It's disappointing to see the spike in robocalls in March, after six consecutive months averaging less than 4 billion robocalls," YouMail CEO Alex Quilici said in a prepared statement about the report.
Roam Research
Information security
fromTechCrunch
1 day ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Privacy professionals
fromTechCrunch
6 days ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
Cryptocurrency
fromCointelegraph
3 weeks ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
#malware
Information security
fromThe Hacker News
1 week ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Privacy professionals
fromWIRED
6 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Privacy technologies
fromZDNET
2 weeks ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Information security
fromTechzine Global
4 days ago

Android trojan linked to Cambodia following anomalous DNS spike

A banking Trojan operating from Cambodia registers 35 new domains monthly, targeting users in 21 countries and exploiting fake apps for fraud.
#whatsapp
fromTechCrunch
1 week ago
Privacy professionals

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

Privacy professionals
fromTechCrunch
1 week ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
2 weeks ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
fromFingerlakes1.com
1 month ago

Report: NYS among worst states for online, social media scams | Fingerlakes1.com

They have to have a real name or organization. They have to have a physical address. There has to be a phone number. There has to be some type of tax ID or other type of financial identification so you know exactly who you're dealing with.
US news
fromGSMArena.com
1 month ago

Spam campaign impersonating us targets T-Online users in Germany

The spammers are spoofing our email address - this means they are falsely setting GSMArena.com as the sender of the email. Specifically, it looks like the email came from tpjdlgcj@gsmarena.com, but that's not an active account on our server (that random jumble of letters is clearly randomly generated). Instead the emails are coming from a server owned by Microsoft (52.103.140.27) and one owned by Oracle (92.5.13.127), neither of which is part of our infrastructure.
Mobile UX
#cybercrime
fromTechRepublic
6 days ago
Information security

New Scam Alert: QR Codes Replace Links in Traffic Ticket Phishing

Cybercriminals are using QR codes in traffic-violation scams to deceive victims into providing sensitive information.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Deliverability
fromThe Conversation
1 month ago

Sick of spam marketing texts and emails? This is how to stop them

Australia's Spam Act prohibits unsolicited commercial electronic messages and requires clear unsubscribe options, with violations resulting in significant penalties like Lululemon's A$702,900 fine.
Privacy technologies
fromTechRepublic
4 weeks ago

Truecaller Gives Families a Way to Stop Scam Calls Remotely - TechRepublic

Truecaller's Family Protection feature enables designated family members to remotely manage scam call defenses for up to five people, including the ability to end suspected fraud calls in real-time on Android devices.
Privacy technologies
fromTechCrunch
1 month ago

Truecaller now lets you hang up on scammers -- on behalf of your family | TechCrunch

Truecaller launched a family group admin feature enabling fraud call alerts and remote call termination to protect members from scams, now available globally including India.
#email-fraud
fromSilicon Canals
2 months ago

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Last month, I sat across from one of the brightest people I know as he explained how he'd lost nearly everything to a sophisticated scam. This wasn't some naive teenager or technophobe. This was my friend from university days, a retired executive who'd navigated corporate politics for decades and made shrewd investment decisions his whole life. Watching him piece together how it happened was like watching someone solve a puzzle in reverse.
Psychology
Privacy technologies
fromwww.socialmediatoday.com
1 month ago

Meta outlines improved scam protection in Messenger app

Meta's Safe Browsing feature in Messenger protects users from malicious links in DMs using on-device models and an expanded Advanced Browsing Protection with a watchlist of millions of potentially dangerous websites.
fromwww.standard.co.uk
2 months ago

Cancer dad lost 'almost every penny' when text scammers posed as daughter in need of 'emergency money'

I told him I am happy to give him some money if he needs money but I don't know what he's talking about. My dad is on the naive end of the spectrum of adults but he is very, very, very kind-hearted and generous. If ever there was a time when I needed money, my dad would send me basically the entire contents of his bank account without hesitation.
Fundraising
#phone-scams
fromZDNET
1 month ago
Information security

Why scammers call you and say nothing - and how to respond safely

fromZDNET
1 month ago
Information security

Why scammers call you and say nothing - and how to respond safely

fromwww.theguardian.com
2 months ago

Don't lose your 12,739 points!' The text scams cashing in on bogus rewards

EE said the messages were sent via RCS, a more advanced type of messaging than SMS, and it is unable to block them (unlike SMS, which it can). EE said it was working with Apple and Google on the problem. Vodafone said its customers were mostly not receiving the texts (labelled as coming from Vodafone) because RCS is not enabled by the carrier on iPhones. However, people on other networks are receiving them.
Mobile UX
Information security
fromTheregister
2 weeks ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Privacy technologies
fromZDNET
1 month ago

Is that message spam or real? This Android trick helps you ID the scams

Android's Circle to Search feature uses AI to identify scam messages by analyzing their content and alerting users to potential fraud.
Privacy professionals
fromPCWorld
2 months ago

Do not reply! These text messages are pure cost traps

Replying to unsolicited prize or urgent SMS messages and calling or texting specified premium numbers can incur immediate, high charges on your mobile bill.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Information security
fromTechzine Global
3 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Privacy professionals
fromSlate Magazine
2 months ago

Help! We Just Dodged an Obvious Scam Call. But One Thing the Scammer Said Has Us Extremely Worried.

A man is falsely credited as the named creator of an Islamophobic book under his name, risking career and reputation; he seeks removal.
fromArs Technica
2 months ago

Millions of people imperiled through sign-in links sent by SMS

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords-and for users to create and enter them-many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.
Privacy technologies
Privacy professionals
fromIrish Independent
1 month ago

Telegram messaging app was fastest growing source of fraud in 2025, Revolut says

Telegram fraud cases in Ireland surged 135% in 2025, becoming the fastest-growing source of authorised push payment scams, accounting for one-fifth of all reported scams globally.
Privacy technologies
fromFast Company
2 months ago

Don't reply 'STOP' to unsolicited text messages. Do this instead

Replying "STOP" to spam texts often confirms an active number and can increase spam; use device blocking and built-in features instead.
fromABC11 Raleigh-Durham
1 month ago

Do you tap to pay? 'Ghost tapping' scams could target your money

The ease of use means the ease of stealing. There are pieces of software and devices that are doing exactly the same thing that a point of sale does and it's transacting on your phone or on your credit card and if you don't have a thumbprint or a biometric on your phone, they can walk up and if you're not paying attention in a crowded area, they get close enough and they touch your phone they can do a transaction.
Information security
Information security
fromSecurityWeek
1 month ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
fromPCWorld
1 month ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
fromTechzine Global
1 month ago

How phishing service Tycoon 2FA went under

Tycoon 2FA, a Phishing-as-a-Service (PhaaS) platform, enabled thousands of cybercriminals to steal login credentials and session tokens. Even accounts secured with MFA could be compromised via a single email. The service had been active since at least 2023 and quickly grew to become one of the most widely used phishing platforms in the world.
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
Information security
fromTheregister
1 month ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
#tax-refund-scams
fromZDNET
2 months ago
Information security

No, the IRS didn't text or email you - 3 ways to protect yourself from scams

fromZDNET
2 months ago
Information security

This IRS text message scam keeps fooling people - 3 ways security experts avoid it

fromZDNET
2 months ago
Information security

No, the IRS didn't text or email you - 3 ways to protect yourself from scams

fromZDNET
2 months ago
Information security

This IRS text message scam keeps fooling people - 3 ways security experts avoid it

Information security
fromSecuritymagazine
2 months ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
Information security
fromArs Technica
2 months ago

There's a rash of scam spam coming from a real Microsoft address

The legitimate Microsoft Power BI address no-reply-powerbi@microsoft.com is being abused to send scam emails that prompt victims to call numbers and install remote-access software.
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
#malvertising
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Information security
fromTravel + Leisure
1 month ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromSilicon Canals
2 months ago

The phone call scam targeting grandparents that sounds so real even cautious people fall for it - Silicon Canals

The phone rings at 2:47 AM. Your heart pounds as you fumble for the receiver. "Grandma?" The voice is shaky, desperate. "I'm in trouble. I got arrested. Please don't tell Mom and Dad." The voice sounds just like your grandson. He uses the nickname only family knows. He remembers that trip you took together last summer. Everything about this call feels real because, in many ways, it is.
Information security
Information security
fromThe Hacker News
1 month ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
Information security
fromComputerworld
1 month ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
[ Load more ]