Cybercrime

Search documents
What to Do When Your Identity Is Used in a Scam? | Migs Bustos | TEDxRizalStreet
TEDx Talks· 2025-07-10 16:08
Before I formally start uh my sharing, I'll just show you a couple of photos. Okay. So, this is a photo of me and this is not my daughter. This is a Photoshop version of my daughter.Pangalawa po, this is going to be the main topic for today. That is me holding this frame. Actually, I received a company award but the woman there is Eliz and I'll be talking about more about her later.This is me with King Charles. King Charles bah. Wow.only I my uh AI self can be able to be in the same breath as King Charles. ...
Whispers of the Web: Exposing Data Privacy and Cyber Deception | Amit Dubey | TEDxNIIT University
TEDx Talks· 2025-07-09 15:14
[Music] Good morning everyone. Good morning again and thank you so much. I'm a cyber crime investigator and whatever I have learned in my life I have learned through criminals and I truly believe criminals are innovators.Every time we solve a case we learn something from them. And I always like to start my session with this line that I would love to change this world but they won't give me the source code. And I truly believe that this entire world is a software program and we all humans are very similar to ...
Q1/2025 Gen Threat Report Reveals AI-Driven Scams Redefining Cybercrime
Prnewswire· 2025-05-28 13:00
Core Insights - The Q1/2025 Gen Threat Report reveals significant increases in cyber threats, including a 186% rise in breached personal information and a 466% increase in phishing reports [2][4][5] - The report highlights the evolution of online threats, with attackers utilizing AI and personalized tactics to enhance deception [3][7] - Gen has successfully protected over 4 million users from Scam-Yourself Attacks, which involve individuals being manipulated into compromising their own devices [7][8] Data Breaches - There was a 36% increase in the number of data breaches faced by companies compared to the previous quarter, with individual breached records rising by over 186% [4] - Attackers are employing advanced infostealers, making data compromise faster and harder to detect [4] Phishing Scams - Phishing reports surged by 466%, now accounting for nearly 32% of all scam submissions to the Norton Genie scam detector [5] - Phishing is identified as the fastest-growing threat, with generic scams making up 51% of reports [5] - Attackers are using dynamic DNS services and subdomain providers to create deceptive login pages, making phishing attempts harder to detect [6] Scam-Yourself Attacks - Gen protected over 4 million users from Scam-Yourself Attacks, where individuals are tricked into infecting their own devices [7] - Attackers are utilizing AI-generated personas and deepfake influencers to deliver malicious campaigns [7] - Fake browser update scams have increased to over 17 times the previous quarter's levels, tricking users into installing malware [8] Financial Threats - Mobile financial threats are on the rise, with malware exploiting accessibility features to steal sensitive data [10] - Digital currencies are increasingly targeted, with one campaign linked to the US presidential inauguration resulting in nearly $4 million stolen through over 2,000 transactions [11] Company Overview - Gen is a global leader in Cyber Safety, providing solutions through trusted brands like Norton, Avast, and LifeLock [1][13] - The company aims to empower individuals to live their digital lives safely and confidently, serving nearly 500 million users in over 150 countries [13]
Fortinet Threat Report Reveals Record Surge in Automated Cyberattacks as Adversaries Weaponize AI and Fresh Techniques
Globenewswire· 2025-04-28 13:00
SUNNYVALE, Calif., April 28, 2025 (GLOBE NEWSWIRE) -- News Summary Fortinet (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced the release of the 2025 Global Threat Landscape Report from FortiGuard Labs. The latest annual report is a snapshot of the active threat landscape and trends from 2024, including a comprehensive analysis across all tactics used in cyberattacks, as outlined in the MITRE ATT&CK framework. The data reveals that threat act ...