#counterfeit-and-fraud

[ follow ]
fromwww.theguardian.com
20 hours ago

Buying a collectible? Beware fakers out to persuade you it's the real deal

Scams involving antiques and collectibles are almost as old as some of the items. But internet sales now mean fraudsters have a much wider audience.
E-Commerce
#art-theft
France news
fromAxios
1 day ago

Priceless items are easy to steal. They're increasingly harder to sell.

Thieves stole three valuable paintings from a small Italian museum in a quick smash-and-grab operation.
Paris food
fromEntrepreneur
4 days ago

It Took Thieves 3 Minutes to Steal $10 Million in Art. Here's Why Museum Heists Are Becoming More Common.

A well-planned heist resulted in the theft of three valuable paintings worth $10 million from the Magnani-Rocca Foundation in Italy.
France news
fromAxios
1 day ago

Priceless items are easy to steal. They're increasingly harder to sell.

Thieves stole three valuable paintings from a small Italian museum in a quick smash-and-grab operation.
Paris food
fromEntrepreneur
4 days ago

It Took Thieves 3 Minutes to Steal $10 Million in Art. Here's Why Museum Heists Are Becoming More Common.

A well-planned heist resulted in the theft of three valuable paintings worth $10 million from the Magnani-Rocca Foundation in Italy.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

US Attorney Connecticut Forfeits $600,000 in Tether Linked to Ledger Phishing Letter

Federal prosecutors recovered over $600,000 in stolen cryptocurrency linked to a phishing scam targeting a hardware wallet user.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

US Attorney Connecticut Forfeits $600,000 in Tether Linked to Ledger Phishing Letter

Federal prosecutors recovered over $600,000 in stolen cryptocurrency linked to a phishing scam targeting a hardware wallet user.
Graphic design
fromThe Verge
1 day ago

Really, you made this without AI? Prove it

Labeling human-made content is essential as AI-generated works proliferate, creating confusion and skepticism among audiences.
Marketing
fromEntrepreneur
2 days ago

How to Navigate Brand Authenticity in the Age of AI Slop

Originality and authenticity in content are essential for brands to stand out in a saturated market dominated by low-quality AI-generated content.
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
#ice
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
#artificial-intelligence
#ai
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Psychology
fromMedium
2 weeks ago

Playing dumb: how AI is beating scammers at their own game

Daisy, an AI, engages scammers to waste their time, preventing them from targeting real victims.
#kitkat
Games
fromMashable
4 days ago

KitKat heist update: This tracker lets you check if a KitKat was stolen

KitKat launched a tracking tool for stolen bars, insisting it's real despite the announcement being on April 1.
Europe news
fromEntrepreneur
5 days ago

Thieves Break Off 400,000 Pieces of KitKat Bars in a Major Heist. Nestle's Reaction Was Surprising.

Thieves stole 12 tons of KitKat bars during transport across Europe, but Nestlé assures no supply shortages will occur.
Games
fromMashable
4 days ago

KitKat heist update: This tracker lets you check if a KitKat was stolen

KitKat launched a tracking tool for stolen bars, insisting it's real despite the announcement being on April 1.
Europe news
fromEntrepreneur
5 days ago

Thieves Break Off 400,000 Pieces of KitKat Bars in a Major Heist. Nestle's Reaction Was Surprising.

Thieves stole 12 tons of KitKat bars during transport across Europe, but Nestlé assures no supply shortages will occur.
London startup
fromFast Company
4 days ago

This simple website tells you if you're eating a stolen KitKat

Nestlé launched a website to track 413,793 stolen KitKat bars, engaging consumers to help locate the missing candy.
#scam
NYC politics
fromHoodline
5 days ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
Boston
fromBoston.com
6 days ago

Bridgewater police warn of Tom Brady impersonation scam

A local family was scammed by someone impersonating Tom Brady, sending gift cards to the fraudster.
NYC politics
fromHoodline
5 days ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
Boston
fromBoston.com
6 days ago

Bridgewater police warn of Tom Brady impersonation scam

A local family was scammed by someone impersonating Tom Brady, sending gift cards to the fraudster.
Education
fromFuturism
5 days ago

Students Renting Smart Glasses to Cheat on Tests

Smart glasses are being used for cheating in exams, with students renting them to gain an advantage.
Psychology
fromPsychology Today
5 days ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
Careers
fromZDNET
6 days ago

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
UK politics
fromwww.independent.co.uk
6 days ago

Less than one per cent of phone theft cases lead to a criminal charge, figures show

Fewer than 1% of mobile phone thefts lead to charges, with 95% of cases closed by the Met Police without identifying a suspect.
#cybersecurity
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
4 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
5 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
4 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
5 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
fromTNW | Data-Security
4 days ago

Hasbro hacked: Peppa Pig & Transformers owner warns of weeks of disruption

Hasbro disclosed unauthorized access to its systems, an intrusion first detected on 28 March that has since forced the company to take parts of its infrastructure offline and warn that product deliveries could be delayed for weeks.
London startup
France news
fromwww.theguardian.com
4 days ago

A truckload of F1 KitKats, a painting of fish: what is it that makes heists so delicious? | Imogen West-Knights

Heists, especially of candy and art, captivate public interest despite the moral implications of theft.
fromRAIN News
1 week ago

Streaming fraud perpetrator Michael Smith faces the music

Michael Smith has preempted his trial by pleading guilty to the fraud scheme, facing a maximum penalty of five years in jail for conspiracy to commit wire fraud.
Music production
Marketing tech
fromPhys
1 week ago

Online ad fraud is a feature, not a bug

Online ad fraud significantly undermines digital advertising revenue, consuming over 20% of global ad spend.
#deepfakes
Cryptocurrency
fromnews.bitcoin.com
5 days ago

FBI Sting Operation Exposes Crypto Price Rigging Network as 10 Foreign Nationals Charged, Over $1M Seized

Federal crackdown reveals a network of alleged crypto price manipulation, highlighting increased enforcement risks for digital asset firms.
Relationships
fromSlate Magazine
2 weeks ago

My Husband's Fear of Identity Theft Is Making Our House Unlivable

Pre-approved credit card offers contain insufficient information for identity theft; shredding all junk mail is unnecessary, though tearing by hand adds minimal extra security.
#phishing
Information security
fromTechzine Global
6 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromSecuritymagazine
6 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromTechzine Global
6 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Travel
fromTravel + Leisure
3 weeks ago

Thieves Always Check These Common Hotel Hiding Spots First-Here, 8 Clever Ways to Protect Your Valuables

Hotel thieves target predictable hiding spots like toiletry kits and dresser drawers, making affordable security lock boxes and disguised containers essential for protecting valuables while traveling.
fromPatently-O
6 days ago

Disclosed but Still Secret? The Federal Circuit Weighs Patent Publications Against Trade Secret Claims

The technology at issue is a subcutaneous cosmetic penile implant, a silicone sleeve placed between the skin and 'Buck's fascia' to enhance girth and length.
Intellectual property law
#supply-chain-security
Information security
fromSecuritymagazine
2 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Information security
fromSecuritymagazine
2 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
UK news
fromwww.theguardian.com
4 weeks ago

The 49 driller killer': steps to avoid locksmith scams

Rogue locksmiths use bait-and-switch tactics, advertising low prices online then charging 10 times more upon arrival, exploiting vulnerable customers locked out of their homes.
fromSecurityWeek
3 days ago

Mercor Hit by LiteLLM Supply Chain Attack

We believe that the compromise originated from the Trivy dependency used in our CI/CD security scanning workflow. Our security team moved promptly to contain and remediate the incident.
Information security
Cryptocurrency
fromCointelegraph
1 week ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Online marketing
fromAxios
1 month ago

Inside a network of more than 200 AI slop websites gaming advertisers

Fraudsters use large language models to generate over 200 fake advertising websites designed to deceive advertisers and capture ad revenue through sensationalized, AI-generated content.
Privacy technologies
fromTheregister
3 weeks ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
Privacy professionals
fromwww.cbc.ca
3 weeks ago

Rising number of scams now use AI, Toronto police warn | CBC News

Criminals use AI to rapidly gather personal information from social media and online profiles to execute highly personalized and credible scams impersonating trusted institutions.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#phishing-as-a-service
Privacy technologies
fromSecurityWeek
1 month ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Privacy technologies
fromSecurityWeek
1 month ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Gadgets
fromThe Verge
2 months ago

Ring can verify videos now, but that might not help you with most AI fakes

Ring Verify attaches a digital security seal to Ring cloud downloads and confirms a video is unmodified since download; any edit causes verification to fail.
fromwww.bbc.com
2 months ago

'Thieves broke into my car - to take parcel shelf'

She said people "just couldn't believe" cars were being broken into just for the shelves. The Met Police opened an investigation following a number of parcel shelves being stolen from cars in Hampstead and Highgate, the force said. Sam Phipps Phipps told BBC Radio London her car was targeted despite only having her gym bag, out of sight, in the boot.
London
Food & drink
fromwww.bbc.com
1 month ago

Why food fraud persists, even with improving tech

Counterfeit honey is widespread, difficult to detect, economically damaging to beekeepers, and often indistinguishable from genuine honey using current testing methods.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Higher education
fromNature
2 months ago

Six steps to protect researchers' digital security

Academic freedom and researchers' safety are deteriorating globally due to harassment, political interference, legal threats, and underreporting.
#phishing-attack
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromSecuritymagazine
3 weeks ago

Targeted Phishing Attack Breaches Biotech Company Data

Intuitive Surgical suffered a phishing attack compromising employee credentials, exposing customer and corporate data, though operational systems and customer networks remained unaffected due to network segmentation.
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromSecuritymagazine
3 weeks ago

Targeted Phishing Attack Breaches Biotech Company Data

Intuitive Surgical suffered a phishing attack compromising employee credentials, exposing customer and corporate data, though operational systems and customer networks remained unaffected due to network segmentation.
Information security
fromTheregister
3 weeks ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromSecurityWeek
3 weeks ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
Information security
fromSecuritymagazine
3 weeks ago

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

Object-specific protection is essential as a primary security layer to prevent art theft, as comprehensive facility-wide systems fail when adversaries physically interact with high-value objects without triggering alarms.
fromPCWorld
4 weeks ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromForbes
1 month ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
fromMashable
1 month ago

Hackers use this tool to bypass fraud detection and weaponize Google ads

The service, referred to as 1Campaign, provides hackers with a one-stop-shop for running malicious ads and enabling fraud "at scale," a recent report by cybersecurity company Varonis uncovered. Using just a single dashboard, hackers can cloak malicious content from security researchers, ad platform reviewers, and automated scanners - who instead see a benign white page - and target general users with phishing or scam attempts.
Information security
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
Information security
fromTechCrunch
1 month ago

Former Tesla product manager wants to make luxury goods impossible to fake, starting with a chip | TechCrunch

A solution combining hack-proof chips and digital certificates uses integrated hardware and software to authenticate luxury goods and protect brands and buyers.
Information security
fromSecurityWeek
1 month ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
[ Load more ]