Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
A long-running and large-scale internet-based fraud scheme netted around $50 million from dozens of investors over an eight-year period. The perpetrators created 150 fake sites that targeted investor...
The primary intention behind artificial intelligence (AI) generated spam on social media appears to be financial gain through deceptive means. Facebook algorithms are suggesting users to visit, view a...
K.I.S.S.I.N.G. First came love, then came marriage, then came the baby in the baby carriage! Sucking his thumb, wetting his pants, doing the hula - hula dance! And the BABY is a Boy! The Yahoo Boys. T...
It’s everyone. (It’s you too. Just read.) Security goes against our core beliefs. Security is not natural, it’s not normal, it means that we don’t trust others. However, we trust by default. Not trust...
The proliferation of AI technologies like voice cloning and caller ID spoofing has opened up new avenues for fraudsters to exploit. By mimicking voices and masking their true caller identities, scamme...
Protecting one’s data and devices on public Wi-Fi goes beyond protecting oneself on just the Wi-Fi aspect. Cyber security is holistic in its nature, meaning the devices hardware, software, and various...
Lets agree on this: Most of what’s written below will NEVER happen to you. Why? Because you are a subscriber to this newsletter and your propensity to consume security related content keeps you curren...
Change Healthcare, a major U.S. healthcare company, reportedly paid $22 million to the BlackCat ransomware group after a cyberattack disrupted services nationwide. However, the cybercriminal who facil...
1. Phishing Scams: Cybercriminals send fake emails or create fake websites pretending to be from the IRS or tax preparation companies. They often request personal information, such as Social Security ...
Why? Because human beings trust by default. Without trust, we wouldn’t survive as a species. From the day we come out of our mama, we simply want and need to trust others in order to survive. And when...
With the ubiquity of people owning smartphones and having a growing dependence on them for e-commerce, it has become an attractive avenue for cybercrime. Security researchers report a 500% surge of mo...
Though it might look like a fun thing to do, you better think twice before taking that quiz that pops up on your social media page. A hacker, otherwise known as a “social engineer” might have created ...