Refusal from social networks will not protect against data "leak"
Attackers are actively creating exact copies of profiles or hacking real accounts to impersonate victims' acquaintances
Fraudsters pose as telecom operators, law enforcement officers, and even victims' colleagues
The pretext is cryptocurrency transactions or other operations
More than 39 million records were compromised
Scammers actively use the obtained card data for their own purposes
Fraudsters initiate dialogue under the guise of issuing a registration certificate or clarifying data, and then demand that they be informed of the "electronic queue" code
The scammer establishes a trusting relationship with the victim and then begins psychological manipulation
Fraudsters created a fake Red Cross account
The entire dialogue with the victim revolves around the allegedly necessary visit of a specialist to the house
Among the main schemes of fraudsters: selling or buying game accounts and "answers" to the Unified State Exam
Attackers disguise malware as legitimate services
A large sum on a regular debit card makes a person a priority target for cybercriminals
Attackers deceive Russians by reporting unauthorized access to accounts and financing of prohibited organizations
People are attracted by "easy money"
Showing 1 to 15 of 17 results