Scam

welivesecurity.com

Four arrested as Microsoft and UK police team up to crack down on technical support scammers

Four people have been arrested after a two-year investigation by Microsoft and British police forces into telephone scams which prey upon the vulnerable, tricking them into believing their computers have been infected by malware.

Read more in my article on the We Live Security blog.

Compromised websites redirecting tech support scam hosted on numeric domains

US internet users are being targeted with technical support scams hosted on sites with numeric domain names.

David Bisson reports.

bitdefender.com

Watch out! Scammers are making a fortune in the iOS App Store

Just how much money can a scammy iPhone app make in the iOS App Store?

You may be surprised. After all, how does $80,000 per month sound to you?

Read more in my article on the Hot for Security blog.

Email hackers cost couple their new home

A group of email hackers set off a chain of events that cost a couple the contract on their new home.

David Bisson reports.

bitdefender.com

Beware bogus emails from LinkedIn asking for your CV!

LinkedIn users are being warned to be on their guard following a rise in reports of attacks being distributed via email designed to trick job seekers into sharing their personal details.

Read more in my article on the Hot for Security blog.

Tracking pixels can conduct surveillance for targeted attacks

Malicious hackers can use tracking pixels to help them gather intelligence for attack campaigns, both mass and targeted in scope say researchers.

David Bisson reports.

The free Nintendo Switch emulator you stumbled upon? Sorry, it’s a fake!

If you want to play a game available for Nintendo Switch, you should just buy a Nintendo Switch. You shouldn’t go online looking for free workarounds or substitutes.

David Bisson reports.

tripwire.com

Five scams that won’t make you laugh on April Fool’s Day

If there’s one day of the year when everyone has their guard up, it’s April Fool’s Day.

After all, who can put their hand up and say that they have never been duped by an April Fool’s trick?

Read more in my article on the Tripwire State of Security blog.

Scareware scammers lock iOS Safari to extort ransom from users

Extortionists have locked iPhone users’ browsers with infinite pop-ups in an attempt to scare users into paying up.

David Bisson reports.

Scammers target tax preparers with last-minute phishing attacks

Scammers are sending last-minute phishing attacks to tax preparers in the hopes of making off with taxpayers’ refunds.

It seems nothing is certain, except scams, death, and taxes.

David Bisson reports.

bitdefender.com

TeamViewer stopped working? Let me guess, your ISP is TalkTalk…

TeamViewer can be used for good. TeamViewer can be used for bad. UK ISP TalkTalk doesn’t want you to use it at all.

Read more in my article on the Hot for Security blog.

Telegram lets scammers connect directly with potential victims by way of stored contacts

Scammers can use the Telegram mobile messaging app to connect with a potential victim if they already have their phone number in their contact list.

David Bisson reports.

Scammers target firms with W-2 phishing/CEO fraud blend

The IRS is warning organizations to be on the lookout for scammers that blend CEO fraud with W-2 phishing.

David Bisson reports.

Employment scam targets college students and their bank accounts

A scam is tricking college students into depositing fraudulent checks into their bank accounts with the promise of employment.

David Bisson reports.

bitdefender.com

Scammers can trick Microsoft Edge into displaying fake security warnings

Technical support scams are more successful for fraudsters the more convincing their warning appears.

Read more in my article on the Hot for Security blog.

bitdefender.com

Has Office Depot claimed your PC had a malware infection when it didn’t?

US retail giant Office Depot has been accused of intentionally tricking its customers by selling costly computer fixes for malware problems that simply don’t exist.

Read more in my article on the Hot for Security blog.