Remove Phishing Remove Scams Remove Surveillance
article thumbnail

LLMs and Phishing

Schneier on Security

Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading victims to respond or click on the link than the usual spam. By using an obvious scam email, the scammer can focus on the most potentially profitable people.

Phishing 344
article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

In January, KrebsOnSecurity told the story of a Canadian man who was falsely charged with larceny and lost his job after becoming the victim of a complex e-commerce scam known as triangulation fraud. In this scam, you receive what you ordered, and the only party left to dispute the transaction is the owner of the stolen payment card.

Scams 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Part two of a four-part series The explosion of AI-driven phishing, insider threats, and business logic abuse has forced a shift toward more proactive, AI-enhanced defenses. Deepfake scams will escalate, with threat actors using AI to create convincing impersonations of executives, risking personal and corporate brands.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Inside the Black Box of Predictive Travel Surveillance Wired Covers the use of powerful surveillance technology in predicting who might be a "threat." Phishing and Scams Covers popular phishing schemes affecting end users - smishing, vishing, and any new scam/phish.

article thumbnail

“Hello pervert” sextortion scam includes new threat of Pegasus—and a picture of your home

Malwarebytes

” Several versions of these scam emails have included the following text: Have you heard of Pegasus? Though Pegasus is indeed a powerfully invasive spyware tool, the threat of its use, as included in these scam emails, is entirely empty. Scammers do this to bypass phishing filters. Often you’re only allowed one day to pay.

Scams 138
article thumbnail

Coronavirus-themed attacks April 12 – April 18, 2020

Security Affairs

PaloAlto Networks experts warn of malicious Coronavirus themed phishing campaigns targeting government and medical organizations. April 14 – FTC says $12 million were lost due to Coronavirus-related scams. April 15 – Coronavirus-themed attack: Experts uncovered flight refund scam.

Scams 140
article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Due to this focus, items primarily affecting enterprises or large organizations may not be included, even if they are widespread or "popular" stories.