Interesting story of an old-school remote-deposit capture fraud scam, wrapped up in a fake employment scam. Slashdot thread. Powered by WPeMatico
Category: scams
Auto Added by WPeMatico
Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon’s ranking system to promote products, protect accounts from disciplinary actions, and crush competitors. Sometimes, these black hat companies bribe corporate Amazon employees to leak information from the company’s wiki pages and business … Read More “Amazon Is Losing the War on Fraudulent Sellers” »
In Gmail addresses, the dots don’t matter. The account “bruceschneier@gmail.com” maps to the exact same address as “bruce.schneier@gmail.com” and “b.r.u.c.e.schneier@gmail.com” — and so on. (Note: I own none of those addresses, if they are actually valid.) This fact can be used to commit fraud: Recently, we observed a group of BEC actors make extensive use … Read More “Using Gmail “Dot Addresses” to Commit Fraud” »
Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: “never give out any information about yourself in response to an unsolicited phone call.” Always call them back, and not using the number offered to you by the caller. Always. Powered by WPeMatico
Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of Bordeaux, where information about market movements took several days to arrive from Paris by mail coach. Accordingly, traders who could get the information more quickly could make money … Read More “1834: The First Cyberattack” »
Fake kidnapping fraud: “Most commonly we have unsolicited calls to potential victims in Australia, purporting to represent the people in authority in China and suggesting to intending victims here they have been involved in some sort of offence in China or elsewhere, for which they’re being held responsible,” Commander McLean said. The scammers threaten the … Read More “Kidnapping Fraud” »
The rise of self-checkout has caused a corresponding rise in shoplifting. Powered by WPeMatico
This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted currency with an address controlled by the attacker. From then on, the attacker receives all coins generated, and owners are none the wiser unless they take time to manually … Read More “New Malware Hijacks Cryptocurrency Mining” »
This article feels like hyperbole: The scam has arrived in Australia after being used in the United States and Britain. The scammer may ask several times “can you hear me?”, to which people would usually reply “yes.” The scammer is then believed to record the “yes” response and end the call. That recording of the … Read More “Stealing Voice Prints” »