article thumbnail

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. The scammers convince the victims to give them remote access to their computers, and then that they’ve mistyped a dollar amount and have received a large refund that they didn’t deserve.

Banking 362
article thumbnail

Electronic payment gateway Slim CD disclosed a data breach impacting 1.7M individuals

Security Affairs

The electronic payment gateway Slim CD disclosed a data breach following a cyberattack. Slim CD’s gateway system allows merchants to accept any kind of electronic payment with a single piece of software. “On or about June 15, 2024, Slim CD became aware of suspicious activity in its computer environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

Social engineering techniques are becoming increasingly sophisticated and are exploiting multiple emerging means, such as deep fakes. The increasing use of videoconferencing platforms and the various forms of remote work also adopted in the post-emergency covid make interpersonal collaborations increasingly virtual.

article thumbnail

GUEST ESSAY: Understanding the security limits of the static and dynamic passwords we rely on

The Last Watchdog

For better or worse, we will continue to use passwords to access our computing devices and digital services for years to come. With fast advancements in computer technology, it has become possible to crack static passwords using, in essence, brute force. We all rely on passwords. Related : The coming of password-less access.

Passwords 232
article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ngo got his treasure trove of consumer data by hacking and social engineering his way into a string of major data brokers. Secret Service. BEGINNINGS.

article thumbnail

North Korean Lazarus APT group targets blockchain tech companies

Malwarebytes

CISA warns that it uses these trojanized applications to gain access to victims’ computers, to spread other malware, and steal private keys or to exploit other security gaps. Victims are lured into downloading the malware with a variety of social engineering tactics, including spearphishing. Mitigation.

article thumbnail

How Cybercriminals are Weathering COVID-19

Krebs on Security

“Also some actors have reported that banks’ customer-support lines are being overloaded, making it difficult for fraudsters to call them for social-engineering activities (such as changing account ownership, raising withdrawal limits, etc).” ” Alex Holden , founder and CTO of Hold Security , agreed.