Remove Passwords Remove Scams Remove Surveillance
article thumbnail

“Hello pervert” sextortion scam includes new threat of Pegasus—and a picture of your home

Malwarebytes

After using passwords obtained from one of the countless breaches as a lure to trick victims into paying, the “Hello pervert” sextortion scammers have recently introduced two new pressure tactics: Name-dropping the infamous Pegasus spyware and adding pictures of your home environment. The scammer says they know “your password.”

Scams 135
article thumbnail

Homebuyers Being Targeted by Money Transfer Scam

Security Affairs

Money Transfer Scam – Scammers hack the victims’s email accounts, monitor conversations between the buyers and title agents, send instructions on where to wire the money. The con in question is a money transfer scam with all the likeness of a typical transaction. Some choose to capitalize on homebuyers’ ignorance.

Scams 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Florida Man Arrested in SIM Swap Conspiracy

Krebs on Security

But SIM swaps are frequently abused by scam artists who trick mobile providers into tying a target’s service to a new SIM card and mobile phone that the attackers control. If, however, SMS-based authentication is the only option available, this is still far better than simply relying on a username and password to protect the account.

Mobile 246
article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Specifically, it was fetching account icons and defaulted to opening password reset pages over HTTP. Once bypassed, threat actors had high-level access and could view information such as user passwords and other stored credentials.

article thumbnail

Synthetic Sabotage: How AI Tools Are Fueling Tailored Phishing Campaigns at Scale

SecureWorld News

RELATED: Hong Kong Clerk Defrauded of $25 Million in Sophisticated Deepfake Scam ] Weaponizing data breach with AI Data breaches have always been a valuable resource for attackers, but AI magnifies their impact and can even use cloud automation tricks to better store, segment, and safeguard data. For phishing, this is a gold mine.

Phishing 102
article thumbnail

SEC X account hacked to hawk crypto-scams

Malwarebytes

The approved Bitcoin ETFs will be subject to ongoing surveillance and compliance measures to ensure continued investor protection.” With this control they can intercept messages, two-factor authentication (2FA) codes, and eventually reset passwords of the account the number has control over.

article thumbnail

Privacy Roundup: Week 7 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Introducing Bitwarden Cupid Vault to securely share (and unshare) passwords with loved ones Bitwarden Bitwarden has already had the ability to securely share passwords. Tips for finding old accounts.