Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time

In this video for Help Net Security, Nick Ascoli, VP of Threat Research, PIXM, discusses a multilayered phishing campaign targeting cryptocurrency exchange Coinbase. Attackers are sending out spoofed Coinbase emails to harvest personal credentials and … Continue reading Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time

Report Claims Coinbase Selling User Geolocation Data to ICE

By Deeba Ahmed
Tech Inquiry’s Jack Paulson has shared startling details about a 3-year contract between the US Department of Homeland…
This is a post from HackRead.com Read the original post: Report Claims Coinbase Selling User Geolocation Data t… Continue reading Report Claims Coinbase Selling User Geolocation Data to ICE

Fighting Fake EDRs With ‘Credit Ratings’ for Police

When KrebsOnSecurity last month explored how cybercriminals were using hacked email accounts at police departments worldwide to obtain warrantless Emergency Data Requests (EDRs) from social media and technology providers, many security experts called it a fundamentally unfixable problem. But don’t tell that to Matt Donahue, a former FBI agent who recently quit the agency to launch a startup that aims to help tech companies do a better job screening out phony law enforcement data requests — in part by assigning trustworthiness or “credit ratings” to law enforcement authorities worldwide. Continue reading Fighting Fake EDRs With ‘Credit Ratings’ for Police

QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Continue reading QR Code Security: How Your Business Can Use Them Responsibly

QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Continue reading QR Code Security: How Your Business Can Use Them Responsibly

How Coinbase Phishers Steal One-Time Passwords

A recent phishing campaign targeting Coinbase users shows thieves are getting cleverer about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active accounts. Continue reading How Coinbase Phishers Steal One-Time Passwords

Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users

By Waqas
working to reimburse the customers for the funds they have lost and help them regain control of their accounts. Here’s what happened.
This is a post from HackRead.com Read the original post: Hackers exploit 2FA flaw to steal crypto from 6,000 … Continue reading Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users

SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam

A Pennsylvania woman who lost the equivalent of $20,000 in cryptocurrency as part of a mobile fraud scheme says T-Mobile failed to protect her account in the face of a wave of similar incidents. Sima Kesler, in a complaint filed Wednesday in Pennsylvania Eastern District Court, alleges she was the victim of a May 2020 SIM swapping scheme, in which scammers convince a phone carrier to give them control of an individual user’s account. With control of a victim’s phone information, thieves can receive text messages and access unrelated accounts tied to the victim’s mobile number. In this case, Kesler says she stored roughly $20,000 in a Coinbase account connected to her T-Mobile subscription. Unknown fraudsters had tricked T-Mobile customer service personnel into handing over access to Kesler’s account, which they then used to deplete her Coinbase of virtually all cryptocurrency, according to the complaint. Kesler’s complaint alleges that she […]

The post SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam appeared first on CyberScoop.

Continue reading SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam

A crypto company’s journey to Data 3.0

Having worked at tech companies like LinkedIn and eBay, I’ve observed firsthand the evolution from Data 1.0 to Data 3.0. In Data 1.0, data is seen as a reactive function providing ad-hoc manual services or firefighting in urgent situations. Continue reading A crypto company’s journey to Data 3.0