There's a whole new dating scam that could mean you end up out of pocket (or beaten up) after a first date with a glamorous admirer, and a woman in Los Alamos uses an Air Tag to entrap a thief. Plus - don't miss our featured interview with Maya Irvine of Sysdig. All this, and a very bad Cockney accent, in the latest edition of the "Smashing Security" podcast by industry veterans Graham Cluley and Carole Theriault.
Scammers are once again using deepfake technology to dupe unwary internet Facebook and Instagram users into making unwise cryptocurrency investments. AI-generated videos promoting fraudulent cryptocurrency trading platform Immediate Edge have used deepfake footage of British Prime Minister Sir Keir Starmer and His Royal Highness Prince William to reach an estimated 890,000 people via Meta's social media platforms. Read more in my article on the Hot for Security blog.
In episode six of The AI Fix, our hosts discover an unusual place to put a traffic cone, Mark learns why Americans should pretend to be from Brazil, and Graham discovers a way to make any situation much, much worse. Graham inflicts his terrible Australian accent on Mark while explaining bot-on-bot crime, and Mark tells … Continue reading "The AI Fix #6: AI lobotomies, and bots scam scam bots"
Microsoft gets itself into a pickle with a privacy-popping new feature on its CoPilot+ PCs, the FTC warns of impersonated companies, and is your company hiring North Korean IT workers? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by author, journalist, and podcaster Geoff White.
The UK Government takes aim at IoT devices shipping with weak or default passwords, an identity thief spends two years in jail after being mistaken for the person who stole his name, and are you au fait with the latest scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin.

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers are prominently using the names of Microsoft and Google to orchestrate phishing attacks. By creating fake websites resembling those of reputable brands, cybercriminals trick users into divulging sensitive information such as passwords and credentials.

The top 10 most imitated brands in phishing attacks are as follows:

    Microsoft, used in approximately 38% of scams
    Google, utilized in about 11% of scams
    LinkedIn – 11%
    Apple Inc. – 5%
    DHL – 5%
    Amazon – 3%
    Facebook – 2%
    Wells Fargo – 2%
    Airbnb – 1%
    Roblox – 1%

This tactic plays on psychological manipulation, enticing victims to click on fake URLs resembling legitimate websites. To avoid falling victim to such scams, users should scrutinize website URLs, ensuring they are protected by HTTPS before proceeding with any activity online. Additionally, it’s crucial to employ security software that receives regular updates, enhancing protection against phishing attempts.

Implementing multifactor authentication adds an extra layer of security to online accounts, making it more challenging for hackers to compromise them. Regularly backing up data is another essential measure to mitigate the impact of successful phishing attacks.

For individuals who have unfortunately fallen prey to phishing scams, resources such as IdentityTheft.gov offer guidance on steps to take to minimize damage and further safeguard personal information. Reporting phishing attempts to reputable organizations like the Anti-Phishing Working Group (APWG) or the Federal Trade Commission (FTC) is vital in combating cyber threats and protecting others from similar scams.

The post Microsoft and Google are top companies to scam users appeared first on Cybersecurity Insiders.