Sextortion Bitcoin scam makes unwelcome return

Credit to Author: Christopher Boyd| Date: Mon, 11 Feb 2019 18:38:53 +0000

A well-worn sextortion scam is back in user’s inboxes. We explain what to look for and why recipients shouldn’t panic.

Categories:

Tags:

(Read more…)

The post Sextortion Bitcoin scam makes unwelcome return appeared first on Malwarebytes Labs.

Read more

Sextortion emails: They’re probably not watching you

Credit to Author: William Tsing| Date: Thu, 25 Oct 2018 15:00:00 +0000

Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

Categories:

Tags:

(Read more…)

The post Sextortion emails: They’re probably not watching you appeared first on Malwarebytes Labs.

Read more

Social engineering attacks: What makes you susceptible?

Credit to Author: Jovi Umawing| Date: Thu, 02 Aug 2018 15:00:00 +0000

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Categories:

Tags:

(Read more…)

The post Social engineering attacks: What makes you susceptible? appeared first on Malwarebytes Labs.

Read more

The Year Targeted Phishing Went Mainstream

Credit to Author: BrianKrebs| Date: Thu, 02 Aug 2018 15:11:45 +0000

A story published here on July 12 about a new sextortion-based phishing scheme that invokes a real password used by each recipient has become the most-read piece on KrebsOnSecurity since this site launched in 2009. And with good reason — sex sells (the second most-read piece here was my 2015 scoop about the Ashley Madison hack). But beneath the lurid allure of both stories lies a more unsettling reality: It has never been easier for scam artists to launch convincing, targeted phishing and extortion scams that are automated on a global scale. And given the sheer volume of hacked and stolen personal data now available online, it seems almost certain we will soon witness many variations on these phishing campaigns that leverage customized data elements to enhance their effectiveness.

Read more

Sextortion Scam Uses Recipient’s Hacked Passwords

Credit to Author: BrianKrebs| Date: Thu, 12 Jul 2018 14:19:53 +0000

Here’s a clever new twist on an old email scam that could serve to make the con far more believable. The message purports to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching porn. The missive threatens to release the video to all your contacts unless you pay a Bitcoin ransom. The new twist? The email now references a real password previously tied to the recipient’s email address.

Read more