DATE | NAME | Info | CATEG. | WEB |
2.11.24 |
Google Voice scams: What are they and how
do I avoid them? |
Watch out for schemes where fraudsters
trick people into sharing verification codes so they can gain access to
their phone numbers |
Spam blog | Eset |
2.11.24 |
ESET Research shares new findings about
Telekopye, a scam toolkit used to defraud people on online marketplaces,
and newly on accommodation booking platforms |
Telekopye transitions to targeting
tourists via hotel booking scam |
Spam blog | Eset |
28.9.24 | Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam | Many spammers have elected to attack web pages and mail servers of legitimate organizations, so they may use these “pirated” resources to send unsolicited email. | Spam blog | Cisco Blog |
28.9.24 | Don’t panic and other tips for staying safe from scareware | Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics | Spam blog | Eset |
14.9.24 | 6 common Geek Squad scams and how to defend against them | Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks | Spam blog | Eset |
7.9.24 | Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe | The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams | Spam blog | Eset |
31.8.24 | The Emerging Dynamics of Deepfake Scam Campaigns on the Web | Our researchers discovered dozens of scam campaigns using deepfake videos featuring the likeness of various public figures, including CEOs, news anchors and top government officials. | Spam blog | Palo Alto |
17.8.24 | How a BEC scam cost a company $60 Million – Week in security with Tony Anscombe | Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme | Spam blog | Eset |
17.8.24 | Why scammers want your phone number | Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data | Spam blog | Eset |
17.8.24 | Top 6 Craigslist scams: Don’t fall for these tricks | Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun | Spam blog | Eset |
13.7.24 | Hidden between the tags: Insights into spammers’ evasion techniques in HTML Smuggling | Talos is releasing a new list of CyberChef recipes that enable faster and easier reversal of encoded JavaScript code contained in the observed HTML attachments. | Spam blog | Cisco Blog |
13.7.24 | 5 common Ticketmaster scams: How fraudsters steal the show | Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account | Spam blog | Eset |
8.6.24 | The job hunter’s guide: Separating genuine offers from scams | $90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into giving up their data. | Spam blog | Eset |
4.5.24 | Adding insult to injury: crypto recovery scams | Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over | Spam blog | Eset |
31.3.24 | Borrower beware: Common loan scams and how to avoid them | Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan. | Spam blog | Eset |
23.3.24 | You’re going to start seeing more tax-related spam, but remember, that doesn’t actually mean there’s more spam | It’s important to be vigilant about tax-related scams any time these deadlines roll around, regardless of what country you’re in, but it’s not like you need to be particularly more skeptical in March and April. | Spam blog | Cisco Blog |
9.3.24 | Top 10 scams targeting seniors – and how to keep your money safe | The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud. | Spam blog | Eset |
4.2.24 | ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign | Unit 42 researchers discovered a large-scale campaign we call ApateWeb that uses a network of over 130,000 domains to deliver scareware, potentially unwanted programs (PUPs) and other scam pages. Among these PUPs, we have identified several adware programs including a rogue browser and different browser extensions. | Spam blog | Palo Alto |
20.1.24 | Virtual kidnapping: How to see through this terrifying scam | Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims | Spam blog | Eset |
20.1.24 | Is Temu safe? What to know before you ‘shop like a billionaire’ | Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal | Spam blog | Eset |