QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Continue reading QR Code Security: How Your Business Can Use Them Responsibly

QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Continue reading QR Code Security: How Your Business Can Use Them Responsibly

How Coinbase Phishers Steal One-Time Passwords

A recent phishing campaign targeting Coinbase users shows thieves are getting cleverer about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active accounts. Continue reading How Coinbase Phishers Steal One-Time Passwords

Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users

By Waqas
working to reimburse the customers for the funds they have lost and help them regain control of their accounts. Here’s what happened.
This is a post from HackRead.com Read the original post: Hackers exploit 2FA flaw to steal crypto from 6,000 … Continue reading Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users

SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam

A Pennsylvania woman who lost the equivalent of $20,000 in cryptocurrency as part of a mobile fraud scheme says T-Mobile failed to protect her account in the face of a wave of similar incidents. Sima Kesler, in a complaint filed Wednesday in Pennsylvania Eastern District Court, alleges she was the victim of a May 2020 SIM swapping scheme, in which scammers convince a phone carrier to give them control of an individual user’s account. With control of a victim’s phone information, thieves can receive text messages and access unrelated accounts tied to the victim’s mobile number. In this case, Kesler says she stored roughly $20,000 in a Coinbase account connected to her T-Mobile subscription. Unknown fraudsters had tricked T-Mobile customer service personnel into handing over access to Kesler’s account, which they then used to deplete her Coinbase of virtually all cryptocurrency, according to the complaint. Kesler’s complaint alleges that she […]

The post SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam appeared first on CyberScoop.

Continue reading SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam

A crypto company’s journey to Data 3.0

Having worked at tech companies like LinkedIn and eBay, I’ve observed firsthand the evolution from Data 1.0 to Data 3.0. In Data 1.0, data is seen as a reactive function providing ad-hoc manual services or firefighting in urgent situations. Continue reading A crypto company’s journey to Data 3.0

DigitalOcean’s IPO filing shows a two-class cloud market

This morning DigitalOcean, a provider of cloud computing services to SMBs, filed to go public. The company intends to list on the New York Stock Exchange (NYSE) under the ticker symbol “DOCN.” DigitalOcean’s offering comes amidst a hot streak for tech IPOs, and valuations that are stretched by historical norms. The cloud hosting company was […] Continue reading DigitalOcean’s IPO filing shows a two-class cloud market

Smashing Security podcast #188: Dinner with Elon Musk and Kris Jenner

Who stopped Twitter’s hackers from stealing more money? Why are Covid-19 researchers being told to ramp up their cybersecurity? How can you find out if your smartphone is infected with stalkerware? And who does Graham think he is turning down a c… Continue reading Smashing Security podcast #188: Dinner with Elon Musk and Kris Jenner