sextortion
Pics AND it Didn’t Happen: Sex Deepfake FBI Alert
Richi Jennings | | Adversarial machine learning, AI, AI (Artificial Intelligence), AI and machine learning, Artificial Intelligence, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), child porn, child pornography, child sexual exploitation, childpornography, Deep Fake, Deep Fakery, Deep fakes, deepfake, deepfake videos, deepfakes, Evil Machine Learning, FBI, machine learning, Machine Learning security, porn, pornography, revenge porn, SB Blogwatch, sex, sextortion, sextortion scam, sextortionist, sexual harassment
Fake Pr0n Hint: Sextortionists stealing your innocent pictures to make AI nudes ...
Security Boulevard
Sextortion Scams – How They Persuade and What to Watch for
Extortion, and especially “sextortion” emails, are becoming more frequent, and they can be extremely alarming when received. Such emails work by using threats to extort money, evoking intense fear. This type of ...
Facebook, Instagram, TikTok and Twitter Target Resellers of Hacked Accounts
BrianKrebs | | @H4CK, Beam, extortion, facebook, Instagram, Ne'er-Do-Well News, Noah Hawkins, ogusers, Ryan Zanelli, sextortion, SIM swapping, swatting, The Coming Storm, TikTok, trusted, Twitter, Web Fraud 2.0
Facebook, Instagram, TikTok, and Twitter this week all took steps to crack down on users involved in trafficking hijacked user accounts across their platforms. The coordinated action seized hundreds of accounts the ...
Troy Hunt Flags Up ‘Sensational’ Sextortion Bug in Grindr
Grindr, the popular dating app, had a ridiculous bug in its password-recovery flow. To make matters worse, Grindr ignored the bug for a week ...
Security Boulevard
Sextortionists Using Social Engineering Tactics to Collect Victims’ Data
David Bisson | | data, IT Security and Data Protection, Latest Security News, sextortion, social engineering
Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information. SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites ...
IT Admins Allegedly Offer Hackers ‘Naked Photos of Boss’s Secretary’ in Exchange for Ransomware Decryption Keys
The infamous ransomware operatives known as the Maze Team have issued a “press release” condemning IT administrators who tried to use bribery to cover up their failure to protect their employers from ...
Nuclear Bot Author Arrested in Sextortion Case
BrianKrebs | | Augustin Inzirillo, LeParisien, Ne'er-Do-Well News, Nuclear Bot, sextortion, TinyNuke
Last summer, a wave of sextortion emails began flooding inboxes around the world. The spammers behind this scheme claimed they'd hacked your computer and recorded videos of you watching porn, and promised ...
Five Emails you don’t want in your Inbox
Phishing attacks are the most common form of cyber attack. Why? The simplicity of email gives cybercriminals an easy route in, allowing them to reach users directly with no defensive barriers, to ...
Phishing Attacks remains a popular Money-Spinner for Cyber Criminals
F5 Labs’ latest Phishing and Fraud Report reveals that phishing continues to be one of the most prevalent ways cybercriminals are breaching data and making money in 2019.Over the years, phishing has ...
New Sextortion Scam Uses Alternative Cryptocurrencies to Evade Detection
David Bisson | | cryptocurrency, IT Security and Data Protection, Latest Security News, scam, sextortion
A new sextortion scam variant is using a wallet for a cryptocurrency other than bitcoin in an attempt to evade detection. On October 8, Cofense revealed it had detected a modified sextortion ...