Fraudsters have found creative ways to scam some businesses

70% of businesses report that fraud losses have increased in recent years and over half of consumers feel they're more of a fraud target than a year ago, according to Experian.
To thwart fraudulent activity in 2024, businesses need to deploy more sophisticated fraud protection solutions that harness the power of data and technology to mitigate risk and protect consumers.
The explosive popularity of generative AI has brought many benefits, but it's also made fraud more accessible.
Using stolen identities, fraudsters will leverage generative AI to create fake identities on social media.
They can then interact online with these new profiles that look like a real consumer.
This could dramatically increase the number of fraud attacks.
Consumers still choose bank branches for account openings.
Although there's been a substantial migration to digital lending experiences, many consumers are heading in-person to bank branches to open new accounts or get financial advice.
Consumers are doing this as they want to feel safer and think they're avoiding online security risks by being in-person.
According to an Experian report, 85% of consumers report physical biometrics as the most trusted and secure authentication method they've recently encountered, but the measure is only currently used by 32% of businesses to detect and protect against fraud.
Experian forecasts that lenders will introduce more digital identity verification steps, such as physical biometrics, at branches for in-person account openings to protect legitimate customers and mitigate losses.
With a rise in online shopping, fraudsters have found creative ways to scam some retailers and small businesses.
Experian predicts that more criminals will use this method to keep merchandise in 2024, leaving businesses with lost goods and revenue.
During the pandemic, many fraudsters created synthetic identities but then quickly found easier methods to steal funds through various aid programs.
Though they may have been dormant, these synthetic identities now have a few years of history.
Businesses will need to collaborate more closely than ever with their fraud-prevention partners to review their current portfolios for synthetic identity accounts.
Fraudsters expand into cause-related and investment deception.
From fake GoFundMe campaigns, social media giveaways, investment opportunities and text fraud, fraudsters are employing new methods that strike an emotional response from consumers with cause-related asks or too-good-to-be-real offers to gain access to consumers' vital, personal information.
Experian predicts that these deceptive cause-related methods will surge in 2024 and beyond.
To avoid becoming victims, consumers will have to be extremely cautious and confirm these opportunities, charities or texts are from the intended party before interacting with them.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Mon, 19 Feb 2024 04:43:05 +0000


Cyber News related to Fraudsters have found creative ways to scam some businesses

Fraudsters have found creative ways to scam some businesses - 70% of businesses report that fraud losses have increased in recent years and over half of consumers feel they're more of a fraud target than a year ago, according to Experian. To thwart fraudulent activity in 2024, businesses need to deploy more ...
9 months ago Helpnetsecurity.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
9 months ago Securityzap.com
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam - Sophisticated Scam Targeting Token Holders: Over 100 popular projects' token holders targeted with fake NFT airdrops appearing from reputable sources. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims to fraudulent websites ...
10 months ago Blog.checkpoint.com
Fraudulent "CryptoRom" Apps Slip Through Apple and Google App Store Review Process - Pig Butchering, also known as Sha Zhu Pan and CryptoRom, is an ugly name for an ugly scam. What is new is that apps perpetrating the scam can be downloaded from the official Apple and Android app stores - giving them greater apparent validity to ...
1 year ago Securityweek.com
New Phishing Scam Hooks META Businesses with Trademark Threats - The phishing scam falsely asserts that the victim's Facebook page will be permanently deleted due to a post allegedly infringing on trademark rights. There is no actual infringement; it's all part of the scammer's malicious plan. In a recent wave of ...
10 months ago Hackread.com
Massive utility scam campaign spreads via online ads - When customers want to discuss their bills or look for ways to save money, scammers are just a phone call away. Enter the utility scam, where crooks pretend to be your utility company so they can threaten and extort as much money from you as they ...
9 months ago Malwarebytes.com
Fraudsters make $50,000 a day by spoofing crypto researchers - Multiple fake accounts impersonating cryptocurrency scam investigators and blockchain security companies are promoting phishing pages to drain wallets in an ongoing campaign on X. To lure potential victims, the scammer uses a breach on major ...
11 months ago Bleepingcomputer.com
Securing Remote Work: A Guide for Businesses - This article aims to provide businesses with a comprehensive guide to securing remote work, covering the essential components of remote work security policies and exploring best practices for ensuring secure communication. By implementing these ...
9 months ago Securityzap.com
The Top 6 Cybersecurity Threats Businesses Must Tackle in 2024 - Through the rise of Artificial Intelligence, increased cyberwarfare and new emerging technologies, the security landscape has evolved significantly, with new threats emerging and existing ones growing in sophistication. Cybersecurity in 2024 is more ...
10 months ago Cybersecurity-insiders.com
FCC adopts lead generation rules to protect consumer privacy - The Federal Communications Commission adopted rules for the Telephone Consumer Protection Act that aim to protect consumers against robocalls and robotexts from lead generation and comparison shopping websites and give consumers the ability to choose ...
10 months ago Techtarget.com
7 Months Inside an Online Scam Labor Camp - He had been kidnapped and forced to work for an abusive online scam operation. A man was abducted by a Chinese gang and forced to work in a scam operation. More than anything else, Neo Lu, a 28-year-old Chinese office worker, believed the gig would ...
11 months ago Nytimes.com
Third Of European Businesses Have Adopted AI, AWS - AWS finds AI already adopted at sizeable number of European businesses, resulting in increased revenues, productivity. An insight into the adoption rate of artificial intelligence within the business community has been offered in a new report from ...
9 months ago Silicon.co.uk
Cloud Security Best Practices for Businesses - In today's digital landscape, ensuring robust cloud security is a crucial priority for businesses. The increasing reliance on cloud services to store and process sensitive data necessitates organizations to adopt best practices to safeguard their ...
10 months ago Securityzap.com
Is that survey real or fake? How to spot a survey scam - Online surveys and quizzes are all over the internet. They're quick and cheap to set up, easy for recipients to fill out, and simple for researchers to interpret. It's no wonder that they remain a popular tool for marketers to reach and research ...
1 year ago Welivesecurity.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
9 months ago Securityzap.com
How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration - Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. A growing number of companies are shifting their strategies to include engaging with consumers in the ...
9 months ago Cyberdefensemagazine.com
How to Protect Yourself from Job Scams: Essential Tips - The internet is a powerful tool in our career search, but it also provides cyber criminals with information and tactics they can use to exploit and deceive people looking for work. Job scams are sadly prevalent on the web, and if you’re job ...
1 year ago Tripwire.com
Thought GDPR Compliance Was Hard? Buckle Up - COMMENTARY. Five years since the European Union's General Data Protection Regulation took effect, its fingerprints are everywhere: from proliferating privacy laws worldwide to the now-ubiquitous consent banners seen across websites of every kind. For ...
11 months ago Darkreading.com
Building Your Defense Toolbox: Tools and Tactics to Combat Cyber Threats - The emergence of AI-powered malicious chatbots, such as WormGPT and FraudGPT, has enabled malicious threat actors to not only refine their skills but also consolidate all their malicious activities and tools into one, like a toolbox. Understanding ...
9 months ago Hackread.com
What Is Cloud Repatriation and Why Are Businesses Doing It? - At first glance, this may seem to indicate that businesses are seeking out ways to reclaim control of their information and take back data stored on the cloud. Cloud repatriation, also known as reverse cloud migration, is when data is moved from the ...
11 months ago Securityboulevard.com
Disadvantages of Cyber Insurance - Cyber insurance provides financial protection for businesses in the event of a cyber attack. Despite its benefits, there are several drawbacks to consider before committing to a policy. Evolving Cyber Threats: The landscape of cyber threats is ...
6 months ago Cybersecurity-insiders.com
Fake Recruiters Defraud Facebook Users via Remote Work Offers - A fresh wave of job scams is spreading on Meta's Facebook platform that aims to lure users with offers for remote-home positions and ultimately defraud them by stealing their personal data and banking credentials. The attackers dangle offers of ...
10 months ago Darkreading.com
Decoding the Elusive 'FedEx' Scam: An Inside Look at the Tactics and Challenges - One type of spam that is going around lately is FedEx scam calls, which have been targeting people, and are also doing the rounds. Most people have been victims of online fraud at some point in their lives. For us to better understand this scam, ...
10 months ago Cysecurity.news
Indian police arrest five accused of trafficking people into scam compounds - On May 27, the National Investigation Agency said it had searched locations across six states and seized evidence like digital devices and bogus employment letters. Southeast Asia's cyber fraud industry, which is run primarily by Chinese organized ...
5 months ago Therecord.media
Cyber Crime Wave: Chinese Scammers Target Europe with Fake Designer Brands - In the last couple of weeks, there has been an increase in the number of people who have been duped into sharing their card details and other personal information with a network of fake online designer shops that are operated from China, which appear ...
6 months ago Cysecurity.news

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)