article thumbnail

Online Businesses Often Steal And Exploit Customer Data Collected During Cancelled Transactions

Joseph Steinberg

Over the past year I have experimented to see how various retailers handle personal information that they collect from customers, especially when such information is collected as part of a purchase made by the customer in what appears, at first glance, to be some “amazing deal.”

article thumbnail

Passport scam foxing Texas populace with data collection

CyberSecurity Insiders

Reacting to the issue, the San Antonio law enforcement department issued a warning on November 4th and November 8th, 2021 urging the populace of Texas not to fall prey to such digital scams using a spoofed phone number of 210-979-4500. They are seen demanding from them payments in Bitcoins to remove their passport number of crime records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LLMs and Phishing

Schneier on Security

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact. So why were scammers still sending such obviously dubious emails?

Phishing 343
article thumbnail

Election season raises fears for nearly a third of people who worry their vote could be leaked

Malwarebytes

Political ads could be hiding online scams, many people feel, and the election, they say, will likely fall victim to some type of “cyber interference.” 52% are “very concerned” or “concerned” about “falling prey to a scam when interacting with political messages.” Avoid robocalls and phone scams.

Scams 139
article thumbnail

Protonmail hacked …. a very strange scam attempt

Security Affairs

link ) was posted on Pastebin , the hacker claims to have compromised user’s email and also accused ProtonMail of sending user’s decrypted data to American servers. AmFearLiathMor also wrote that ProtonMail hasn’t configured the mandatory Subresource Integrity ( SRI ) allowing tampering and data collection.

Scams 111
article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

The data collected through these operations can provide insights into voter demographics, potentially influencing election outcomes. For a monthly fee, attackers can access sophisticated services that automate the creation of fraudulent emails, increasing the efficiency of their scams.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

How cars became the worst product category for privacy Session Covers the extensive data collection (and subsequent sharing with car manufacturers and their affiliates) enabled by modern vehicles; they can collect way beyond location data.