<?xml version="1.0"?>		
			<rss
			version="2.0"
			xmlns:content="http://purl.org/rss/1.0/modules/content/"
			xmlns:wfw="http://wellformedweb.org/CommentAPI/"
			xmlns:dc="http://purl.org/dc/elements/1.1/"
			xmlns:atom="http://www.w3.org/2005/Atom"
			xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
			xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
			xmlns:georss="http://www.georss.org/georss"
			xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#">
				<channel>				
					<atom:link href="https://www.malwarebytes.com/blog/feed" rel="self" type="application/rss+xml"/>
					<title>Malwarebytes</title>
					<link>https://www.malwarebytes.com/</link>
					<description><![CDATA[Cyber Security Software &amp; Anti-Malware]]></description>
					<pubDate>Tue, 24 Jun 2025 20:37:45 GMT</pubDate>
					<lastBuildDate>Tue, 24 Jun 2025 20:37:45 GMT</lastBuildDate>
					<sy:updatePeriod>hourly</sy:updatePeriod>
					<sy:updateFrequency>1</sy:updateFrequency>
					<language>en</language>
												<item>
								<title><![CDATA[ Thousands of private camera feeds found online. Make sure yours isn&#8217;t one of them ]]></title>
								<description><![CDATA[ What happens in the privacy of your own home stays there. Or does it? ]]></description>						
																		<category>News</category>
																				<category>Privacy</category>
																				<category><![CDATA[ internet-enabled camera ]]></category>
																				<category><![CDATA[ webcams ]]></category>
																			<content:encoded><![CDATA[
<p>If you have internet-connected cameras in or around your home, be sure to check their settings. Researchers just discovered 40,000 of them serving up images of homes and businesses to the internet.</p>



<p>Bitsight&#8217;s TRACE research team revealed the issue in a <a href="https://www.bitsight.com/blog/bitsight-identifies-thousands-of-compromised-security-cameras" target="_blank" rel="noreferrer noopener nofollow">report</a> released this month. The cameras were providing the images without any kind of password or authentication, it said. While some of them were connected to businesses, showing images of offices, retail stores, and factories, many were likely connected in private residences.</p>



<p>Many cameras contain their own web servers that people can access remotely using a browser or app so that they can monitor their premises while away. These are often completely exposed to the internet, according to the report. That means anyone could access the video feed by typing in the right IP address.</p>



<p>The highest number of exposed cameras by far was in the US, at around 14,000. Breaking down the states there showed the highest concentrations in California and Texas.</p>



<p>Japan, the second highest country, had just half that, at 7,000. After that came Austria, Czechia, South Korea, Germany, Italy, Russia, and Taiwan.</p>



<p>The big threat for such users is privacy. People put these cameras everywhere, including extra-private spaces in their homes like kids&#8217; and adults&#8217; bedrooms. Attackers might spy on people or even set them up for extortion if the images are compromising.</p>



<p>Aside from the obvious privacy implications, there are other security worries, the report said. Cameras could be used to gather surveillance data by someone planning a physical intrusion, it pointed out.</p>



<p>But access to admin interfaces is just one threat; getting SSH access (which allows someone to log into the device via a terminal and control it as they would a regular computer) could give an attacker total control over the camera&#8217;s hardware and software if they&#8217;re able to exploit vulnerabilities left there by the manufacturer.</p>



<p>If this happens, a camera (which is, after all, just a computer with a lens) could become a jumping-off point for the attacker to compromise other computers on the network. Or it could be joined to a botnet to do the attacker&#8217;s bidding.</p>



<p>Botnets made of up connected devices are common. One of the most famous such botnets, Mirai, co-opted cameras and other internet-connected systems to launch denial of service attacks, in which thousands of devices would try to connect with a target, flooding it with traffic and rendering it inoperable.</p>



<p>Bitsight&#8217;s report also cites one case where attackers used vulnerabilities in a camera to install ransomware on it.</p>



<h2 class="wp-block-heading" id="h-a-long-history-of-camera-compromise"><a>A long history of camera compromise</a></h2>



<p>Internet-enabled camera issues are nothing new. Finding exposed feeds, whether via Bitsight&#8217;s own scanning engine or via publicly accessible ones like Shodan.io, is like shooting fish in a barrel. Indeed, Bitsight <a href="https://www.bitsight.com/blog/bitsight-identifies-thousands-organizations-using-internet-facing-and-exposed-webcams" target="_blank" rel="noreferrer noopener nofollow">did something similar</a> in 2023. In the past, we&#8217;ve seen sites like Insecam (now offline), which <a href="https://www.tomshardware.com/tech-industry/cyber-security/massive-privacy-concern-over-40-000-security-cameras-are-streaming-unsecured-footage-worldwide" target="_blank" rel="noreferrer noopener nofollow">streamed images</a> from 40,000 unsecured video cameras around the world. Some of those cameras were doubtless there for public consumption, just as many were not.</p>



<p>Finding unsecured feeds is so easy because people tend to just plug these things in and turn them on, much as you might use a portable air conditioner. Vendors should force some basic cybersecurity hygiene, but they don&#8217;t, because they don&#8217;t want to introduce any costly friction. Regulation for connected smart devices like IP cameras has emerged in the <a href="https://www.malwarebytes.com/blog/news/2020/11/iot-cybersecurity-bill-passed-by-senate">US</a> and the <a href="https://www.malwarebytes.com/blog/news/2021/11/new-law-will-issue-bans-fines-for-using-default-passwords-on-smart-devices">UK</a>, but enforcement is another issue.</p>



<p>Some might advise you to only choose a respectable brand of IP camera, but you can&#8217;t always trust big-name vendors who claim to act responsibly. Last year, Amazon <a href="https://www.malwarebytes.com/blog/news/2024/04/ring-agrees-to-pay-5-6-million-after-cameras-were-used-to-spy-on-customers">settled</a> with the Federal Trade Commission, paying $5.6m over charges that its employees and contractors spied on users of its Ring cameras.</p>



<p>Ring allowed <a href="https://www.malwarebytes.com/blog/news/2023/06/amazons-ring-camera-used-to-spy-on-customers">everyone working for it</a> to see any customer&#8217;s feeds, the FTC said, which led to some employees repeatedly accessing feeds of young women in sensitive areas of the home. Ring also failed to protect its cameras adequately against intruders that compromised them, the FTC said. That led to intruders taking control of the cameras. They would use camera microphones to hurl racial slurs at children, and swear at women lying in bed, the complaint alleged.</p>



<p>Other vendor missteps have included Wyze <a href="https://www.malwarebytes.com/blog/news/2024/02/wyze-cameras-show-the-wrong-feeds-to-customers-again">accidentally showing customers</a> each others&#8217; video feeds, and Eufy <a href="https://www.malwarebytes.com/blog/news/2022/12/is-your-home-security-system-storing-data-100-locally">sending camera images to the cloud</a> when it said it wouldn&#8217;t.</p>



<h2 class="wp-block-heading" id="h-how-to-protect-your-internet-enabled-camera"><a>How to protect your internet-enabled camera</a></h2>



<p>We can&#8217;t think of a worse privacy scenario than having someone snoop on you and your loved ones in what is supposed to be your safest space. Letting any connected device into your home is always risky, especially when it has video capabilities. Here is some advice to minimize that risk:</p>



<ul class="wp-block-list">
<li><strong>Use unique credentials.</strong> Make sure that you set unique logins and passwords for your cameras so that people can&#8217;t just stroll in and view them. That means taking some time to configure the camera through its admin interface and making sure to change the default password.</li>



<li><strong>Restrict IP camera use to non-sensitive places as much as possible.</strong> While some Ring customers apparently needed cameras in the bathroom and bedroom, we urge you to think twice.</li>



<li><strong>Research the camera for vulnerabilities.</strong> Check to see whether the brand you&#8217;re considering has had any security issues in the past, and how quickly the issues have been fixed.</li>



<li><strong>Try accessing your camera insecurely.</strong> Try accessing your camera remotely without using your login credentials. If you can, then so can everyone else.</li>



<li><strong>Patch regularly.</strong> Find out how to update your device with the latest security patches and check for updates regularly, or preferably set it to update automatically if you can.</li>
</ul>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" />



<p><strong>We don’t just report on threats—we remove them</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/thousands-of-private-camera-feeds-found-online-make-sure-yours-isnt-one-of-them</link>
								<pubDate>Tue, 24 Jun 2025 20:37:45 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/thousands-of-private-camera-feeds-found-online-make-sure-yours-isnt-one-of-them</guid>
							</item>
														<item>
								<title><![CDATA[ Gmail&#8217;s multi-factor authentication bypassed by  hackers to pull off targeted attacks ]]></title>
								<description><![CDATA[ Russian hackers have convinced targets to share their app passwords in very sophisticated and targeted social engineering attacks. ]]></description>						
																		<category>News</category>
																				<category>Scams</category>
																				<category><![CDATA[ app passwords ]]></category>
																				<category><![CDATA[ gmail ]]></category>
																				<category><![CDATA[ russian ]]></category>
																			<content:encoded><![CDATA[
<p>Russian hackers have bypassed Google&#8217;s multi-factor authentication (MFA) in Gmail to pull off targeted attacks, according to <a href="https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia" target="_blank" rel="noreferrer noopener nofollow">security researchers at Google Threat Intelligence Group</a> (GTIG).</p>



<p>The hackers pulled this off by posing as US Department of State officials in advanced social engineering attacks, building a rapport with the target and then persuading them into creating app-specific passwords (app passwords).</p>



<p>App passwords are special 16-digit codes that Google generates to allow certain apps or devices to access your Google Account securely, especially when you have MFA enabled.</p>



<p>Normally, when you sign in to your Google account, you use your regular password plus a second verification step like a code sent to your phone. But since some older or less secure apps and devices—like certain email clients, cameras, or older phones—are unable to handle this extra verification step, Google provides app passwords as an alternative way to sign in.</p>



<p>However, because app passwords skip the second verification step, hackers can steal or phish them more easily than a full MFA login.</p>



<p>In an example provided by <a href="https://citizenlab.ca/2025/06/russian-government-linked-social-engineering-targets-app-specific-passwords/" target="_blank" rel="noreferrer noopener nofollow">CitizenLab</a>, the attackers initially made contact by posing as a State Department representative, inviting the target to a consultation in the setting of a private online conversation.</p>



<p>Although the invitation came from a Gmail account, it CCed four @state.gov accounts, giving a false sense of security and making the target believe that other people at the State Department had monitored the email conversation.</p>



<p>Most likely, the attacker fabricated those email addresses, knowing that the State Department’s email server accepts all messages and does not send a bounce response even if the addresses do not exist.</p>



<p>As the conversation unfolded and the target showed interest, they received an official looking document with instructions to register for an “MS DoS Guest Tenant” account. The document outlined the process of&nbsp; “adding your work account… to our MS DoS Guest Tenant platform,” which included creating an app password to “enable secure communications between internal employees and external partners.”</p>



<p>So, while the target believes they are creating and sharing an app password to access a State Department platform in a secure way, they are actually giving the attacker full access to their Google account.</p>



<p>The targets of this campaign, which ran for months, were prominent academics and critics of Russia, and was set up with so much attention for details and skill that the researchers suspect the attacker was a Russian state-sponsored entity.</p>



<h2 class="wp-block-heading" id="h-be-safe-avoid-app-passwords">Be safe, avoid app passwords</h2>



<p>Now that this bypass is known, we can expect more social engineering attacks leveraging app-specific passwords in the future. Here&#8217;s how to stay safe:</p>



<ul class="wp-block-list">
<li>Only use app passwords when absolutely necessary. If you have the opportunity to change to apps and devices that support more secure sign-in methods, make that switch.</li>



<li>The <a href="https://www.malwarebytes.com/blog/news/2023/10/multi-factor-authentication-has-proven-it-works-so-what-are-we-waiting-for">advice to enable MFA</a> still stands strong, but not all MFA is created equal. Authenticator apps (like Google Authenticator) or hardware security keys (FIDO2/WebAuthn) are more resistant to attacks than SMS-based codes, let alone app passwords.</li>



<li>Regularly educate yourself and others about recognizing phishing attempts. Attackers often bypass MFA by tricking users into revealing credentials or app passwords through phishing. </li>



<li>Keep an eye on unusual login attempts or suspicious behavior, such as logins from unfamiliar locations or devices. And limit those logins where possible.</li>



<li>Regularly update your operating system and the apps you use to patch vulnerabilities that attackers might exploit. Enable automatic updates whenever possible so you don&#8217;t have to remember yourself.</li>



<li>Use <a href="https://www.malwarebytes.com/">security software</a> that can block malicious domains and recognize scams.</li>
</ul>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" />



<p><strong>We don’t just report on threats—we remove them</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/gmails-multi-factor-authentication-bypassed-by-hackers-to-pull-off-targeted-attacks</link>
								<pubDate>Mon, 23 Jun 2025 12:47:23 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/gmails-multi-factor-authentication-bypassed-by-hackers-to-pull-off-targeted-attacks</guid>
							</item>
														<item>
								<title><![CDATA[ A week in security (June 15 &#8211; June 21) ]]></title>
								<description><![CDATA[ Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! ]]></description>						
																		<category>News</category>
																				<category><![CDATA[ reddit ]]></category>
																				<category><![CDATA[ websites hijack ]]></category>
																				<category><![CDATA[ whatsapp ]]></category>
																			<content:encoded><![CDATA[
<p>Last week on Malwarebytes Labs:</p>



<ul class="wp-block-list">
<li><a href="/blog/podcast/2025/06/the-data-on-denying-social-media-for-kids-re-air-lock-and-code-s06e12">The data on denying social media for kids (re-air) (Lock and Code S06E12)</a></li>



<li><a href="/blog/news/2025/06/reddits-new-ai-powered-tools-scan-your-posts-to-serve-you-better-ads">Reddit’s new AI-powered tools scan your posts to serve you better ads</a></li>



<li><a href="/blog/news/2025/06/smart-air-fryers-ordered-to-stop-invading-our-digital-privacy">Smart air fryers ordered to stop invading our digital privacy</a></li>



<li><a href="/blog/news/2025/06/whatsapp-to-start-targeting-you-with-ads">WhatsApp to start targeting you with ads</a></li>



<li><a href="/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number">Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number</a></li>



<li><a href="/blog/news/2025/06/5-riskiest-places-to-get-scammed-online">5 riskiest places to get scammed online</a></li>



<li><a href="/blog/news/2025/06/fake-bank-ads-on-instagram-scam-victims-out-of-money">Fake bank ads on Instagram scam victims out of money</a></li>



<li><a href="/blog/news/2025/06/mattels-going-to-make-ai-powered-toys-kids-rights-advocates-are-worried">Mattel’s going to make AI-powered toys, kids’ rights advocates are worried</a></li>



<li><a href="/blog/news/2025/06/billions-of-logins-for-apple-google-facebook-telegram-and-more-found-exposed-online">Billions of logins for Apple, Google, Facebook, Telegram, and more found exposed online</a></li>
</ul>



<p>Last week on ThreatDown:</p>



<ul class="wp-block-list">
<li><a href="https://www.threatdown.com/blog/atomic-stealer-now-using-clipboard-hijacking-to-target-macs/">Atomic Stealer now using clipboard hijacking to target Macs</a></li>



<li><a href="https://www.threatdown.com/blog/simplehelp-exploited-by-dragonforce-ransomware-group">SimpleHelp exploited by DragonForce ransomware group</a></li>
</ul>



<p>Stay safe!</p>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" />



<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.</p>



<div class="wp-block-malware-bytes-button mb-button" id="mb-button-371336e6-815b-4134-8818-f944dbc308bb"><div class="mb-button__row u-justify-content-center"><div class="mb-button__item mb-button-item-0"><p class="btn-main"><a href="https://www.malwarebytes.com/business/contact-us/">TRY NOW</a></p></div></div></div>



<p></p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/a-week-in-security-june-15-june-21</link>
								<pubDate>Mon, 23 Jun 2025 07:05:58 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/a-week-in-security-june-15-june-21</guid>
							</item>
														<item>
								<title><![CDATA[ Billions of logins for Apple, Google, Facebook, Telegram, and more found exposed online ]]></title>
								<description><![CDATA[ Researchers have uncovered 30 exposed data sets containing over 16 billion login credentials which were likely harvested by infostealers. ]]></description>						
																		<category>News</category>
																				<category>Privacy</category>
																				<category><![CDATA[ 16 billion ]]></category>
																				<category><![CDATA[ infostealers ]]></category>
																				<category><![CDATA[ login credentials ]]></category>
																			<content:encoded><![CDATA[
<p>When organizations, good or bad, start hoarding collections of login credentials the numbers quickly add up. Take the <a href="https://www.malwarebytes.com/blog/news/2025/05/184-million-logins-for-instagram-roblox-facebook-snapchat-and-more-exposed-online">184 million logins for social media accounts</a> we reported about recently. Now try to imagine 16 billion!</p>



<p>Researchers at <a href="https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/" target="_blank" rel="noreferrer noopener nofollow">Cybernews</a> have discovered 30 exposed datasets containing from several millions to over 3.5 billion records each. In total, the researchers uncovered an unimaginable 16 billion records.</p>



<p>The likely source: <a href="https://www.malwarebytes.com/blog/threats/info-stealers">information stealers</a>, or infostealers for short. Infostealers are malicious software designed specifically to gather sensitive information from infected devices. These malware variants silently extract credentials stored in browsers, email clients, messaging apps, and even crypto wallets, and send the data to cybercriminals.</p>



<p>The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. And no chance for us to cross-reference the data with our sources to find out more about their origin and age.</p>



<p>But that doesn’t take away from the fact that these credentials are in the hands of cybercriminals who can use them for:</p>



<ul class="wp-block-list">
<li><strong>Account takeovers</strong>: Cybercriminals can use stolen credentials to hijack social media, banking, or corporate accounts.</li>



<li><strong>Identity theft</strong>: Personal details enable fraud, loan applications, or impersonation.</li>



<li><strong>Targeted phishing</strong>: Combining leaked data allows cybercriminals to engage in very convincing and personalized scams.</li>



<li><strong>Ransomware/business email compromise (BEC) attacks</strong>: Compromised business credentials facilitate network intrusions or fraudulent wire transfers.</li>
</ul>



<p>The leak includes credentials for virtually every large online service. Apple, Google, Facebook, Telegram, developer platforms, VPNs, and more.</p>



<p>And the number is so massive it exceeds our imagination. If you printed each credential (16 billion usernames + passwords) on a single line, using standard paper, and stacked the pages, the pile would reach far beyond the edge of the stratosphere (roughly 35 miles).</p>



<h2 class="wp-block-heading" id="h-how-to-protect-against-infostealers">How to protect against infostealers</h2>



<p>There are a few things you can do to limit the dangers of infostealers:</p>



<ul class="wp-block-list">
<li><strong>Use an up-to-date and <a href="https://www.malwarebytes.com/premium">active anti-malware solution</a></strong> that can detect and remove infostealers.</li>



<li><strong>Do not reuse passwords across different sites and services. </strong>A password manager can be very helpful to create safe passwords and remember them for you. </li>



<li><strong>Enable two-factor authentication (2FA) for every account you can.</strong> 2FA makes it much more difficult for an attacker to access your account with your login credentials.&nbsp;If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a href="https://www.malwarebytes.com/blog/news/2023/10/multi-factor-authentication-has-proven-it-works-so-what-are-we-waiting-for" target="_blank" rel="noreferrer noopener">2FA</a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.</li>
</ul>



<h2 class="wp-block-heading" id="h-check-your-digital-footprint"><strong>Check your digital footprint</strong></h2>



<p>Data stolen by infostealers is often sold or posted online. If you want to find out what personal data of yours has been exposed online, you can use our&nbsp;<a href="https://www.malwarebytes.com/digital-footprint">free Digital Footprint scan</a>. Fill in the email address you’re curious about (it’s best to submit the one you most frequently use) and we’ll give you a free report.</p>



<div class="wp-block-malware-bytes-button mb-button" id="mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf"><div class="mb-button__row u-justify-content-center"><div class="mb-button__item mb-button-item-0"><p class="btn-main"><a href="https://www.malwarebytes.com/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1"></a><a href="https://www.malwarebytes.com/digital-footprint">SCAN NOW</a></p></div></div></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide" />



<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identity</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your—and your family&#8217;s—personal information by using <a href="https://www.malwarebytes.com/identity-theft-protection">identity protection</a>.</p>



<p></p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/billions-of-logins-for-apple-google-facebook-telegram-and-more-found-exposed-online</link>
								<pubDate>Thu, 19 Jun 2025 13:58:36 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/billions-of-logins-for-apple-google-facebook-telegram-and-more-found-exposed-online</guid>
							</item>
														<item>
								<title><![CDATA[ Mattel&#8217;s going to make AI-powered toys, kids’ rights advocates are worried ]]></title>
								<description><![CDATA[ Toy company Mattel has announced a deal with OpenAI to create AI-powered toys, but digital rights advocates have urged caution. ]]></description>						
																		<category>AI</category>
																				<category>News</category>
																				<category><![CDATA[ AI ]]></category>
																				<category><![CDATA[ mattel ]]></category>
																			<content:encoded><![CDATA[
<p>Toy company Mattel has <a href="https://corporate.mattel.com/news/mattel-and-openai-announce-strategic-collaboration" target="_blank" rel="noreferrer noopener nofollow">announced a deal</a> with OpenAI to create AI-powered toys, but digital rights advocates have urged caution.</p>



<p>In a press release last week, the owner of the Barbie brand signed a &#8220;strategic collaboration&#8221; with the AI company, which owns ChatGPT. &#8220;By using OpenAI&#8217;s technology, Mattel will bring the magic of AI to age-appropriate play experiences with an emphasis on innovation, privacy, and safety,&#8221; it said.</p>



<p>Details on what might emerge were scarce, but Mattel said that it only integrates new technologies into its products in &#8220;a safe, thoughtful, and responsible way&#8221;.</p>



<p>Advocacy groups were quick to denounce the move. Robert Weissman, co-president of public rights advocacy group Public Citizen, <a href="https://www.citizen.org/news/mattels-open-ai-collaboration-is-dangerous-for-children/" target="_blank" rel="noreferrer noopener nofollow">commented:</a> </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#8220;Mattel should announce immediately that it will not incorporate AI technology into children&#8217;s toys. Children do not have the cognitive capacity to distinguish fully between reality and play.</p>



<p>Endowing toys with human-seeming voices that are able to engage in human-like conversations risks inflicting real damage on children. It may undermine social development, interfere with children&#8217;s ability to form peer relationships, pull children away from playtime with peers, and possibly inflict long-term harm.&#8221;</p>
</blockquote>



<h2 class="wp-block-heading" id="h-the-kids-aren-t-alright">The kids aren&#8217;t alright</h2>



<p>Some are concerned about the effect of AI on young developing minds. Researchers from universities including Harvard and Carnegie Mellon have <a href="https://link.springer.com/chapter/10.1007/978-3-031-69362-5_83" target="_blank" rel="noreferrer noopener nofollow">warned</a> about negative social effects, along with a tendency for children to attribute human-like properties to AI.</p>



<p>One such child, 14 year-old Sewell Seltzer III, <a href="https://arstechnica.com/tech-policy/2024/10/chatbots-posed-as-therapist-and-adult-lover-in-teen-suicide-case-lawsuit-says/" target="_blank" rel="noreferrer noopener nofollow">took his own life</a> after repeatedly talking to chatbots from Character.AI, which allows users to create their own AI characters.</p>



<p>In a lawsuit against the company, his mother Megan Garcia described how he began losing sleep and growing more depressed after using the service, to the point where he fell asleep in class. A therapist diagnosed him with anxiety and disruptive mood disorder. It emerged that he had become obsessed with an AI representing an adult character from Game of Thrones that purported to be in a real romantic relationship with him.</p>



<h2 class="wp-block-heading" id="h-past-mistakes">Past mistakes</h2>



<p>We&#8217;re not suggesting Mattel would condone such activities. It cites &#8220;more than 80 years of earned trust from parents and families&#8221;, but that statement glosses over previous missteps.</p>



<p>These include Hello Barbie. Mattel launched this Wi-Fi connected doll in 2015 and encouraged kids to talk with it. It <a href="https://journals.sagepub.com/doi/pdf/10.1177/2053951720919151" target="_blank" rel="noreferrer noopener nofollow">asked personal questions</a> about children and their families, sending that audio to a third-party company that used AI to generate a response. Non-profit group Fairplay, which advocates for protecting children from inappropriate technology and brand marketing, launched a campaign protesting child surveillance. Subsequently, investigators <a href="https://archive.is/Y3tup" target="_blank" rel="noreferrer noopener nofollow">found vulnerabilities</a> that would allow intruders to eavesdrop on that audio. Mattel pulled the toy from shelves in 2017.</p>



<p>Fairplay executive Josh Golin slammed the OpenAI partnership announcement.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#8220;Apparently, Mattel learned nothing from the failure of its creepy surveillance doll Hello Barbie a decade ago and is now escalating its threats to children&#8217;s privacy, safety and well-being.</p>



<p>Children&#8217;s creativity thrives when their toys and play are powered by their own imagination, not AI. And given how often AI &#8216;hallucinates&#8217; or gives harmful advice, there is no reason to believe Mattel and OpenAI&#8217;s &#8216;guardrails&#8217; will actually keep kids safe.&#8221;</p>
</blockquote>



<p>Another incident where Mattel lost parents&#8217; trust was back in November 2024 when a <a href="https://www.theguardian.com/film/2024/nov/11/mattel-apologises-after-mistakenly-linking-to-porn-website-on-wicked-dolls" target="_blank" rel="noreferrer noopener nofollow">packaging mistake</a> sent owners of its &#8216;Wicked&#8217; doll to an adult movie website (Wicked Pictures) instead of a promotional landing page for the Wicked movie.</p>



<p>Incidents like these show that even with the best intentions in the world, companies can make mistakes. </p>



<p>Ultimately, it&#8217;s up to parents to make decisions about whether they&#8217;ll expose their children to AI-powered toys. It&#8217;s perhaps inevitable that AI will reach every corner of our lives, but is it ready and polished enough to be used on our children?</p>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" />



<p><strong>We don’t just report on threats—we remove them</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p>



<p></p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/mattels-going-to-make-ai-powered-toys-kids-rights-advocates-are-worried</link>
								<pubDate>Thu, 19 Jun 2025 13:36:48 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/mattels-going-to-make-ai-powered-toys-kids-rights-advocates-are-worried</guid>
							</item>
														<item>
								<title><![CDATA[ Fake bank ads on Instagram scam victims out of money ]]></title>
								<description><![CDATA[ Several Instagram ads have been found impersonating banks, including the usage of deepfake videos to defraud consumers. ]]></description>						
																		<category>News</category>
																				<category>Scams</category>
																				<category><![CDATA[ advertisements ]]></category>
																				<category><![CDATA[ banks ]]></category>
																				<category><![CDATA[ deepfake ]]></category>
																			<content:encoded><![CDATA[
<p>Ads on Instagram—including deepfake videos—are impersonating trusted financial institutions like Bank of Montreal (BMO) and EQ Bank (Equitable Bank) in order to scam people, according to <a href="https://www.bleepingcomputer.com/news/security/instagram-bmo-ads-use-ai-deepfakes-to-scam-banking-customers/" target="_blank" rel="noreferrer noopener nofollow">BleepingComputer</a>.</p>



<p>There are some variations in how the scammers approach this. Some use Artificial Intelligence (AI) to create deepfake videos aimed at gathering personal information, while others link to <a href="https://www.malwarebytes.com/blog/news/2016/06/explained-typosquatting">typosquatted</a> domains that not just look the same but also have very similar domain names as the impersonated bank.</p>



<p>BleepingComputer shows an example of an advertisement, which claims to be from &#8220;Eq Marketing&#8221; and closely mimics EQ Bank&#8217;s branding and color scheme, while promising a rather optimistic interest yield of &#8220;4.5%&#8221;.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" height="930" width="1024" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/BC_example.jpg?w=1024" alt="Advertisement leading to fake website" class="wp-image-253718" /><figcaption class="wp-element-caption"><em>Image courtesy of BleepingComputer</em></figcaption></figure>



<p>In this example, using the &#8220;Yes, continue with my account&#8221; button presents the user with a fraudulent &#8220;EQ Bank&#8221; login screen, prompting the visitor to provide their banking credentials. From there, it&#8217;s likely the scammers will empty the bank account and move on to their next victim.</p>



<p>Another fraudulent ad impersonates BMO bank&#8217;s Chief Investment Strategist and leader of the Investment Strategy Group Brian Belski. This may lead people to believe they are getting valuable financial advice, for example by luring them to a &#8220;private WhatsApp investment group&#8221;.</p>



<p>Impersonations of bank employees and authorities are increasing and can often sound very convincing. These scammers demand immediate payment or action to avoid further impacts, which can dupe individuals into inadvertently sending money to a fraudulent account.</p>



<p>It&#8217;s not just Instagram where WhatsApp investment groups are used as a lure by scammers. On X we see invites like these several times a week.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="562" height="733" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/WhatsApp_investment_group_chat_invitations.jpg" alt="WhatsApp investment group invitation" class="wp-image-253719" /></figure>



<h2 class="wp-block-heading" id="h-recommendations-to-stay-safe">Recommendations to stay safe</h2>



<p>As cyberthreats and financial scams become more sophisticated, it is increasingly difficult for individuals to determine if a request coming via social media, email, text, phone call or even video call is authentic.</p>



<p>By staying alert and proactive, you can outsmart even the most convincing deepfake scams. Remember, a healthy dose of skepticism is your best companion in the digital age.</p>



<ul class="wp-block-list">
<li><strong>Verify before you trust:</strong> Always double check the legitimacy of any ad or message claiming to be from your bank. Go to your bank’s official website or contact them directly using verified contact details before taking any action.</li>



<li><strong>Double check the advertiser account: </strong>BleepingComputer found that the advertiser accounts running the fake ads on Instagram only had pages on Facebook, not on Instagram itself.</li>



<li><strong>Look for red flags:</strong>&nbsp;Be wary of ads that create a sense of urgency, promise unrealistic rewards, or ask for sensitive information like passwords or PINs.&nbsp;Authentic banks will never request such details through social media or ads.</li>



<li><strong>Scrutinize visuals and language:</strong>&nbsp;Deepfakes can be convincing, but subtle inconsistencies in video quality, unnatural facial movements, or awkward phrasing can be giveaways.&nbsp;Trust your instincts if something feels off.</li>



<li><strong>Enable Multi-Factor Authentication (MFA) :</strong> Strengthen your account security by enabling MFA on your banking and social media accounts. This adds an extra layer of protection even if your credentials are compromised.</li>



<li><strong>Report suspicious content:</strong>&nbsp;If you encounter a suspicious ad or message, report it to Instagram and notify your bank immediately.&nbsp;Your vigilance can help prevent others from falling victim.</li>



<li><strong>Use web protection:</strong> This can range from <a href="https://www.malwarebytes.com/premium">programs that block known malicious sites</a>, to <a href="https://www.malwarebytes.com/browserguard">browser extensions</a> that can detect skimmers, to <a href="https://www.malwarebytes.com/blog/product/2025/06/scammers-are-constantly-changing-the-game-but-so-are-we-introducing-malwarebytes-scam-guard">sophisticated assistants</a> that you can ask if something is a scam.</li>



<li><strong>Stay informed:</strong>&nbsp;Keep up to date with the latest scam tactics and security advice from your bank and reputable cybersecurity sources.&nbsp;Awareness is your best defense.</li>
</ul>



<p><strong>We don&#8217;t just report on threats &#8211; we help protect your social media</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your social media accounts by using <a href="https://www.malwarebytes.com/identity-theft-protection" target="_blank" rel="noreferrer noopener">Malwarebytes Identity Theft Protection</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/fake-bank-ads-on-instagram-scam-victims-out-of-money</link>
								<pubDate>Wed, 18 Jun 2025 14:18:30 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/fake-bank-ads-on-instagram-scam-victims-out-of-money</guid>
							</item>
														<item>
								<title><![CDATA[ 5 riskiest places to get scammed online ]]></title>
								<description><![CDATA[ These five communication channels are favored by scammers to try and trick victims at least once a week—if not more.  ]]></description>						
																		<category>News</category>
																				<category>Scams</category>
																				<category><![CDATA[ phone scam ]]></category>
																				<category><![CDATA[ scam ]]></category>
																			<content:encoded><![CDATA[
<p>Scammers love your smartphone.</p>



<p>They can text you fraudulent tracking links for packages you never bought. They can profess their empty love to you across your social media apps. They can bombard your email inbox with phishing attempts, impersonate a family member through a phone call, and even trick you into visiting malicious versions of legitimate websites.</p>



<p>But, <a href="https://www.malwarebytes.com/mobile-scams">according to new research from Malwarebytes</a>, while scammers can reach people through just about any modern method of communication, they have at least five favored tracts for finding new victims—emails, phone calls and voicemails, malicious websites, social media platforms, and text messages. It’s here that people are most likely to find phishing attempts, romance scams, sextortion threats, and more, and it’s here that everyday people should stay most cautious when receiving messages from unknown senders or in responding to allegedly urgent requests for money or information.</p>



<p>For this research, Malwarebytes surveyed 1,300 people over the age of 18 in the US, UK, Austria, Germany, and Switzerland, asking about the frequency, type, impact, and consequences of any scams they found on their smartphones. Capturing just how aggravating today’s online world is, a full 78% of people said they encountered or received a scam on their smartphone at least once a week.</p>



<p>Here are the top five places that people actually encountered those weekly scams:</p>



<ul class="wp-block-list">
<li>65% of people encountered a scam at least once a week through their <strong>email</strong></li>



<li>53% encountered a scam at least once a week through <strong>phone calls and voicemails</strong></li>



<li>50% encountered a scam at least once a week through <strong>text messages (SMS)</strong></li>



<li>49% encountered a scam at least once a week through <strong>malicious websites</strong></li>



<li>47% encountered a scam at least once a week through <strong>social media platforms</strong></li>
</ul>



<p>Unfortunately, scam prevention cannot fixate on only these five channels, as scammers change their tactics based on how they’re trying to trick their victims. For instance, though people were least likely to encounter a scam once a week through a buying or selling platform like Facebook Marketplace or Craigslist (36%), such platforms were of course the most likely place for scam <em>victims</em> to have their credit card details and passwords stolen by a scammer masquerading as a legitimate business.</p>



<p>The noise from such daily strife has become deeply confusing, as just 15% of people strongly agreed that they could confidently identify a scam on their phone.</p>



<h2 class="wp-block-heading" id="h-daily-dilemma"><strong>Daily dilemma</strong></h2>



<p>While 78% of people encountered a scam on their smartphone at least once a week, a shocking 44% of people encountered a scam at least <em>daily</em>. Similar to the weekly breakdown, here are the top five ways that people encountered scams once a day:</p>



<ul class="wp-block-list">
<li>34% of people encountered a scam at least once a day through their <strong>email</strong></li>



<li>25% encountered a scam at least once a day through <strong>malicious websites</strong></li>



<li>24% encountered a scam at least once a day through <strong>phone calls and voicemails</strong></li>



<li>24% encountered a scam at least once a day through <strong>social media platforms</strong></li>



<li>22% encountered a scam at least once a day through <strong>text messages (SMS)</strong></li>
</ul>



<p>This list encompasses so much of any person’s daily use of their smartphone. They use it to check emails, browse the internet, make phone calls, scroll through social media, and text family and friends. And yet, it is in these exact places that people have come to expect getting scammed. As if the 44% of people who encounter a daily scam wasn’t depressing enough, there are 28% of people who said they encounter scams “multiple times a day.”</p>



<p>But the frequency of scams can only reveal so much. How, exactly, are scammers trying to trick their targets?</p>



<h2 class="wp-block-heading" id="h-social-engineering-and-extortion"><strong>Social engineering and extortion</strong></h2>



<p>Scams are so difficult to analyze because they vary both in their delivery method and their method of deceit. A message that tries to trick a person into clicking a package tracking link is a simple act of social engineering—relying on false urgency or faked identity to fool a victim. But that message itself can come through a text message or an email, and it can direct a person to a malicious website on the internet. A romance scam, similarly, can start on a social media platform but can move into a messaging service like WhatsApp. And sometimes, a threat to release private information—which can be categorized as “extortion”—can happen through a phone call, a text message, or any combination of other communication channels.</p>



<p>This is why, to understand how people were being harmed by scams, Malwarebytes asked respondents about roughly 20 types of cybercrime that they could encounter and experience.</p>



<p>Broadly, Malwarebytes found that 74% of people had “encountered” or come across a social engineering scam, and that 36% fell victim to such scams. These were the most common social engineering scams that people encountered and that they experienced:</p>



<ul class="wp-block-list">
<li><strong>Phishing/smishing/vishing</strong>: 53% encountered and 19% experienced</li>



<li><strong>USPS/FedEx/postal scams</strong>: 42% encountered and 12% experienced</li>



<li><strong>Impersonation scams</strong>: 35% encountered and 10% experienced</li>



<li><strong>Marketplace or business scams</strong>: 33% encountered and 10% experienced</li>



<li><strong>Romance scams</strong>: 33% encountered and 10% experienced</li>
</ul>



<p>For respondents who experienced any type of scam—making them scam victims—Malwarebytes also asked where they had found or encountered that scam. Here, the results show a far more intimate picture of where scams are most likely to harm the public.</p>



<p>For instance, 26% of charity scam victims were originally tricked on social media platforms. 37% of postal notification scam victims were first reached, predictably, through SMS/text messages. And, interestingly, despite how frequently cryptocurrency scams spread through social media, the most likely place for such a scam victim to be contacted was through email (30% for email vs. 13% for social media).</p>



<p>In its research, Malwarebytes also discovered that 17% of people have fallen victim to extortion scams, which includes ransomware scares, virtual kidnapping schemes, and threats to release sexually explicit photos (sextortion) or deepfake images.</p>



<p>Here, scam victims again shared where these scams arrived. The most popular channels for deepfake scammers to victimize people were social media platforms and emails—both at 17%. For sextortion scam victims, the most popular channel was email, at 35%. And 24% of virtual kidnapping scam victims said they were contacted through text messages, making it the most popular way to deliver such a threat.</p>



<p>These numbers may look depressing, but they should instead educate. No, there is no such thing as a perfectly safe communication channel today. But that doesn&#8217;t mean there isn&#8217;t help.</p>



<h2 class="wp-block-heading" id="h-check-if-something-is-a-scam">Check if something is a scam</h2>



<p><a href="https://www.malwarebytes.com/blog/product/2025/06/scammers-are-constantly-changing-the-game-but-so-are-we-introducing-malwarebytes-scam-guard">Malwarebytes Scam Guard</a> is a free, AI-powered digital safety companion that reviews any concerning text, email, phone number, link, image, or online message and provides on the spot guidance to help users avert and report scams. Just share a screenshot of any questionable message—like that strange email demanding a password reset or that alarming text flagging a traffic penalty—and Scam Guard will guide you to safety.</p>



<div class="wp-block-malware-bytes-button mb-button" id="mb-button-3c473e79-5c3f-4590-83bd-47c74a5c81da"><div class="mb-button__row u-justify-content-center"><div class="mb-button__item mb-button-item-0"><p class="btn-main"><a href="https://app.malwarebytes.com/AgCJ/grb5w2g1">Try Scam Guard today</a></p></div></div></div>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/5-riskiest-places-to-get-scammed-online</link>
								<pubDate>Wed, 18 Jun 2025 09:48:40 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/5-riskiest-places-to-get-scammed-online</guid>
							</item>
														<item>
								<title><![CDATA[ Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number ]]></title>
								<description><![CDATA[ Scammers are abusing sponsored search results, displaying their scammy phone number on legitimate brand websites. ]]></description>						
																		<category>News</category>
																				<category>Scams</category>
																				<category>Threat Intelligence</category>
																				<category><![CDATA[ phone numbers ]]></category>
																				<category><![CDATA[ sponsored ads ]]></category>
																				<category><![CDATA[ tech support scammers ]]></category>
																			<content:encoded><![CDATA[
<p><em>The examples in this post are actual fraud attempts found by Malwarebytes Senior Director of Research, Jérôme Segura.</em></p>



<p>Cybercriminals frequently use fake search engine listings to take advantage of our trust in popular brands, and then scam us. It often starts, as with so many attacks, with a sponsored search result on Google.</p>



<p>In the latest example of this type of scam, we found tech support scammers hijacking the results of people looking for 24/7 support for Apple, Bank of America, Facebook, HP, Microsoft, Netflix, and PayPal.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" width="372" height="152" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/sponsored.png" alt="sponsored search result for Netflix" class="wp-image-248508" /></figure>



<p>Here&#8217;s how it works: <a href="https://www.malwarebytes.com/blog/product/2025/05/tired-of-google-sponsored-ads-so-are-we-thats-why-were-introducing-the-option-to-block-them-on-ios">Cybercriminals pay for a sponsored ad</a> on Google pretending to be a major brand. Often, this ad leads people to a fake website. However, in the cases we recently found, the visitor is taken to the legitimate site with a small difference.</p>



<p>Visitors are taken to the help/support section of the brand’s website, but instead of the genuine phone number, the hijackers display their scammy number instead.</p>



<p>The browser address bar will show that of the legitimate site and so there&#8217;s no reason for suspicion. However, the information the visitor sees will be misleading, because the search results have been poisoned to display the scammer&#8217;s number prominently in what looks like an official search result.</p>



<p>Once the number is called, the scammers will pose as the brand with the aim of getting their victim to hand over personal data or card details, or even allow remote access to their computer. In the case of Bank of America or PayPal, the scammers want access to their victim&#8217;s financial account so they can empty it of money.</p>



<p>A technically more correct name for this type of attack would be a search parameter injection attack, because the scammer has crafted a malicious URL that embeds their own fake phone number into the genuine site&#8217;s legitimate search functionality.</p>



<p>See the below example on Netflix:</p>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" width="1758" height="1259" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/netflix.jpg" alt="Netflix Help Center with scammer's number" class="wp-image-248509" style="width:700px" /></figure>



<p>These tactics are very effective because:</p>



<ul class="wp-block-list">
<li>Users see the legitimate Netflix URL in their address bar</li>



<li>The page layout looks authentic (again, because it is the real Netflix site)</li>



<li>The fake number appears in what looks like a search result, making it seem official.</li>
</ul>



<p>This is able to happen because Netflix&#8217;s search functionality blindly reflects whatever users put in the search query parameter without proper sanitization or validation. This creates a reflected input vulnerability that scammers can exploit.</p>



<p>Fortunately, Malwarebytes Browser Guard caught this and shows a warning about &#8220;<a href="https://www.malwarebytes.com/blog/product/2025/05/take-back-control-of-your-browsermalwarebytes-browser-guard-will-now-block-search-hijacking-attempts">Search Hijacking Detected</a>,&#8221; and explains that unauthorized changes were made to search results with an overlaid phone number.</p>



<p>But Netflix is just one example. As we mentioned earlier, we found that other brands, such as PayPal, Apple, Microsoft, Facebook, Bank of America, and HP being abused in the same way by scammers.</p>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" width="1758" height="1259" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/HP.jpg" alt="HP Customer Service page with scammer's phone number" class="wp-image-248510" style="width:700px" /></figure>



<p>The HP example is a bit clearer to identify as suspicious, as it says “4 Results for” which is shown in front of the scammers text. But even then if you&#8217;re on a genuine website you expect to see a genuine number, right?</p>



<p>Interestingly, Apple is the one where we found the scammer&#8217;s number was the hardest to identify as false.</p>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" width="1758" height="1259" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/apple.jpg" alt="Apple Support page with scammer's phone number" class="wp-image-248511" style="width:700px" /></figure>



<p>This looks as if the web page tells the visitor they have no matches for their search, so they&#8217;d better call the number on display. That would drive them straight in the arms of scammers.</p>



<h2 class="wp-block-heading" id="h-how-to-stay-safe-from-tech-support-scams">How to stay safe from tech support scams</h2>



<p>As demonstrated in these cases, <a href="https://www.malwarebytes.com/browserguard">Malwarebytes Browser Guard</a> is a great defense mechanism against this kind of scam, and it is free to use.</p>



<p>There are also some other red flags to keep an eye out for:</p>



<ul class="wp-block-list">
<li>A phone number in the URL</li>



<li>Suspicious search terms like &#8220;Call Now&#8221; or &#8220;Emergency Support&#8221; in the address bar of the browser</li>



<li>Lots of encoded characters like the %20 (space) and %2B (+ sign) along with phone numbers</li>



<li>The website showing a search result before you entered one</li>



<li>The urgent language (Call Now, Account suspended, Emergency support) displayed on the website</li>



<li>An in-browser warning for known scams (don’t ignore this).</li>
</ul>



<p>And before you call any brand&#8217;s support number, look up the official number in previous communications you&#8217;ve had with the company (such as an email, or on social media) and compare it to the one you found in the search results. If they are different, investigate until you’re sure which one is the legitimate one.</p>



<p>If during the call, you are asked for personal information or banking details that have nothing to do with the matter you&#8217;re calling about, hang up.</p>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" />



<p><strong>We don’t just report on threats—we remove them</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number</link>
								<pubDate>Wed, 18 Jun 2025 09:28:19 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number</guid>
							</item>
														<item>
								<title><![CDATA[ WhatsApp to start targeting you with ads ]]></title>
								<description><![CDATA[ WhatsApp has announced it will start showing its users targeted ads. Will this be yet another Meta "Pay or OK" choice? ]]></description>						
																		<category>News</category>
																				<category>Privacy</category>
																				<category><![CDATA[ Meta ]]></category>
																				<category><![CDATA[ targeted advertising ]]></category>
																				<category><![CDATA[ whatsapp ]]></category>
																			<content:encoded><![CDATA[
<p>WhatsApp <a href="https://blog.whatsapp.com/helping-you-find-more-channels-and-businesses-on-whatsapp" target="_blank" rel="noreferrer noopener nofollow">has announced</a> that it will start to show you targeted ads on the app. The ads, it says, will appear under the <strong>Updates</strong> tab.</p>



<p>WhatsApp launched the Updates tab a year ago, and now 1.5 billion people visit it every day. Updates has historically been a place for users to follow news and updates from their favorite companies, news organizations and celebrities. </p>



<p>This is different to the <strong>Chats</strong> tab where users send and receive messages. Chats remain end-to-end encrypted and, according to Meta’s vice president for product management Nikila Srinivasan, will not display ads.</p>



<p>To determine your interests for ad purposes, WhatsApp says:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“We’ll use limited info like your country or city, language, the Channels you’re following, and how you interact with the ads you see. For people that have chosen to add WhatsApp to Accounts Center, we&#8217;ll also use your ad preferences and info from across your Meta accounts.”</p>
</blockquote>



<p>That means that anyone who has linked their Facebook or Instagram accounts with their WhatsApp account will now have that data used for ad targeting. This cross-platform integration feels like a significant invasion of privacy, especially for users who expected WhatsApp to remain more private than Facebook or Instagram.</p>



<p>The European privacy group NOYB (None Of Your Business) has already <a href="https://noyb.eu/en/whatsapp-getting-ads-using-personal-data-instagram-and-facebook" target="_blank" rel="noreferrer noopener nofollow">voiced concerns</a>, warning that WhatsApp may soon adopt the same “Pay or OK” model as Facebook and Instagram to obtain the user consent that&#8217;s required under EU law.</p>



<p>With Meta’s “Pay or OK” system, users face a choice between two options nobody asked for: either pay a monthly subscription fee to avoid targeted ads and tracking, or accept extensive data collection and personalized advertising in exchange for free access. If you don’t want your data tracked, you must pay. If you don’t pay, you must accept tracking and profiling for ads.</p>



<p>Meta introduced this model in response to strict privacy regulations in Europe, especially the General Data Protection Regulation (GDPR), which requires companies to get clear, “freely given” consent from users before using their data for personalized ads.</p>



<p>In the past, Meta has argued that it had obtained a ruling of the Court of Justice of the European Union (CJEU) that <a href="https://www.malwarebytes.com/blog/news/2023/11/meta-sued-over-forcing-users-to-pay-to-stop-tracking">accepted the subscription model</a> as a valid form of consent for an ads funded service.</p>



<p>Meta also said its pricing was in line with those of ad-free services such as YouTube Premium and Spotify Premium. However, it conveniently forgot to consider that ad-free services are not the same as those that gather data about you and sell them to the highest bidder to create personalized ads.</p>



<p>WhatsApp built its reputation on privacy, with end-to-end encryption and minimal data collection. And, as privacy advocates feared, bringing it into the Meta “family” moved the platform away from its privacy-first roots.</p>



<p>Even if WhatsApp says it won’t read your messages, it can still use your usage patterns, contacts, and other metadata to build detailed profiles for advertisers. This increases the risk of data leaks, misuse, or surveillance.</p>



<h2 class="wp-block-heading" id="h-what-can-users-do">What can users do?</h2>



<p>A while back I asked whether it was a <a href="https://www.malwarebytes.com/blog/news/2025/03/moving-from-whatsapp-to-signal-a-good-idea">good idea to move from WhatsApp to Signal</a>. With this new development, the question may be worth reconsidering.</p>



<p>If you’re on iOS 18, you can now allow <a href="https://martinkulawik.de/en/blog/ios-18-use-whatsapp-without-sharing-your-entire-contact-list/" target="_blank" rel="noreferrer noopener nofollow">WhatsApp to access only selected contacts</a> instead of your entire address book. This reduces the amount of data WhatsApp can collect about your network.</p>



<p>On Android, you can technically use WhatsApp without granting access to your contacts, but you’ll need to manually start chats using wa.me links. Or, for convenience, you can use a third-party app that does the work for you.</p>



<p>WhatsApp frequently adds or changes privacy options, so revisit your settings periodically to maintain control.</p>



<p>If you can, disassociate your WhatsApp account from other Meta accounts you may have. Don’t use the same email address, handle, etc. You can remove your WhatsApp account from the <a href="https://www.meta.com/help/accounts-center/1894490827562393/" target="_blank" rel="noreferrer noopener nofollow">Meta Accounts Center</a>, but it is unclear whether Meta will “remember” the link if it once existed.</p>



<p><strong>We don&#8217;t just report on threats &#8211; we help protect your social media</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your social media accounts by using <a href="https://www.malwarebytes.com/identity-theft-protection" target="_blank" rel="noreferrer noopener">Malwarebytes Identity Theft Protection</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/whatsapp-to-start-targeting-you-with-ads</link>
								<pubDate>Tue, 17 Jun 2025 19:49:12 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/whatsapp-to-start-targeting-you-with-ads</guid>
							</item>
														<item>
								<title><![CDATA[ Smart air fryers ordered to stop invading our digital privacy ]]></title>
								<description><![CDATA[ In a confirmation that we've gone full Black Mirror, air fryer and other IoT manufacturers are being told to stop playing with our data. ]]></description>						
																		<category>News</category>
																				<category><![CDATA[ air fryers ]]></category>
																				<category><![CDATA[ Internet of Things ]]></category>
																				<category><![CDATA[ smart home ]]></category>
																			<content:encoded><![CDATA[
<p>In a confirmation that we&#8217;ve gone full Black Mirror, the UK&#8217;s privacy czar has wagged a finger at air fryer manufacturers and told them to stop playing with our data.</p>



<p>New draft <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/06/new-guidance-to-help-smart-product-manufacturers-get-data-protection-right/" target="_blank" rel="noreferrer noopener nofollow">guidance</a> from the Information Commissioner&#8217;s Office (ICO) targets not just air fryer vendors but manufacturers of any smart home products, ranging from smart lighting systems through to internet-connected refrigerators and connected toys.</p>



<p>Collectively known as IoT (Internet of Things) devices, these connected objects have a nasty habit of collecting our data without us really understanding what they&#8217;re doing. It&#8217;s a problem with many of them, although late last year Which? magazine <a href="https://www.malwarebytes.com/blog/news/2024/11/air-fryers-are-the-latest-surveillance-threat-you-didnt-consider">added air fryers</a> to the list of offenders.</p>



<p>The guidance highlights data that IoT vendors might collect. This includes registration data such as an owner&#8217;s name, address, and email. It also means information gathered directly from the product that reveals how the user interacts with it. A device might simply tell its manufacturer when you used the product and how long for, but sensors embedded in it might monitor anything from temperature to motion.</p>



<p>The ICO is interested in enforcing privacy laws such as the UK&#8217;s version of the General Data Protection Regulation (UK GDPR). That allows products to process user information if it&#8217;s purely for domestic use, like asking a smart speaker to play Lady Gaga&#8217;s all-time greatest hits, say.</p>



<p>But if the IoT vendor uses audio recordings of the person&#8217;s interactions with the speaker to improve its own service or even to make inferences about that person from their musical choices, then that isn&#8217;t domestic use. That&#8217;s processing for the company&#8217;s own purposes, and it falls on the wrong side of the law.</p>



<h2 class="wp-block-heading" id="h-consent-is-key">Consent is key</h2>



<p>The guidance tells vendors to ask for consent when processing this kind of data. That means ensuring that users can easily tell what they&#8217;re consenting to, and be able to make a clear choice not to do so.</p>



<p>Users should be able to find out how the manufacturer is using their information after they sign up for the service, says the ICO. They must also be able to withdraw consent at any time. In practice, that helps people who might click a consent button early on but then think twice about it later and decide to change their permissions.</p>



<p>When vendors do collect information about users they must tell them what they&#8217;re collecting, and why they&#8217;re using it. They should tell people what decisions they&#8217;re making with it, and how it affects their service. People should also be informed about how long the vendor will keep that data.</p>



<p>The company should also process user data fairly. That means only doing what people expect them to do with it, and not in ways that harm the user.</p>



<p>This is all good advice, and in keeping with existing privacy laws, but it means vendors will have a fine line to walk. Some of the requirements are nuanced. For example, the guidance asks companies to consider ways of making their privacy information easy to follow. That means giving them all the information they need without overloading them. It might require careful user interface design, along with collaboration between designers and privacy or compliance professionals.</p>



<p>Where appropriate, design choices like navigation panels, collapsible lists, large text, and diagrams will go a long way towards satisfying these requirements, the ICO says.</p>



<h2 class="wp-block-heading" id="h-there-s-an-existing-uk-law-for-iot-security">There&#8217;s an existing UK law for IoT security</h2>



<p>There&#8217;s also a section outlining security for IoT devices and the data they collect. This points to an existing UK law called the Product and Telecommunications Infrastructure Regulations 2024 (PSTI Regulations), which came into effect last year. This calls for specific protections such as the use of unique passwords for devices, encryption of user data, and regular security updates.</p>



<p>The security aspect of IoT is perhaps one of the most important of all. Even companies with the best of intentions can make mistakes and leak customer data gathered by everything from <a href="https://www.malwarebytes.com/blog/news/2023/09/smart-chastity-device-exposes-sensitive-user-data">connected chastity devices</a> through to <a href="https://www.malwarebytes.com/blog/news/2018/04/please-dont-buy-smart-toys">kids&#8217; toys</a>.</p>



<p>This guidance applies not just to smart connected objects but to the apps that vendors often provide with them. Those apps, which give you data about what your smart object is doing and allow you to control it, are great ways for vendors to harvest information about you.</p>



<h2 class="wp-block-heading" id="h-you-re-your-own-best-protection">You&#8217;re your own best protection</h2>



<p>The document is still in draft form and open to consultation. Because it&#8217;s UK guidance it likely won&#8217;t protect people not in the UK. As always, the first line of defense is you.</p>



<p>So, when buying a smart home device, consider whether an app for it is necessary. Your smart fryer might have no way of phoning home without an app, but you might be able to just check whether your food is done without needing your phone to tell you.</p>



<p>In some cases, you might want to consider whether you really need a product to be connected at all. Connected devices are a great way for companies to <a href="https://www.independent.co.uk/news/world/americas/snoo-bassinet-baby-sleeping-subscription-b2597869.html" target="_blank" rel="noreferrer noopener nofollow">nickel and dime you unexpectedly</a> through subscription programs, or <a href="https://support.spotify.com/us/article/car-thing-discontinued/" target="_blank" rel="noreferrer noopener nofollow">brick your product remotely</a> when they decide it isn&#8217;t profitable for them any more.</p>



<p>Sometimes, all you want to do is cook up some hot fries without things getting too complicated, you know?</p>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" />



<p><strong>We don’t just report on threats—we remove them</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/smart-air-fryers-ordered-to-stop-invading-our-digital-privacy</link>
								<pubDate>Tue, 17 Jun 2025 11:05:36 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/smart-air-fryers-ordered-to-stop-invading-our-digital-privacy</guid>
							</item>
														<item>
								<title><![CDATA[ Reddit&#8217;s new AI-powered tools scan your posts to serve you better ads ]]></title>
								<description><![CDATA[ Reddit has announced more AI-powered tools to help advertisers. But do users care for it? ]]></description>						
																		<category>News</category>
																				<category>Privacy</category>
																				<category><![CDATA[ AI ]]></category>
																				<category><![CDATA[ marketing ]]></category>
																				<category><![CDATA[ reddit ]]></category>
																			<content:encoded><![CDATA[
<p>Reddit has <a href="https://cybernews.com/tech/reddit-announces-community-intelligence/" target="_blank" rel="noreferrer noopener nofollow">introduced</a> two Artificial Intelligence (AI) tools which will use Reddit comments, posts, and conversations to help sellers make the most of the community.</p>



<p>Reddit is a social media platform and online forum where users can share and discuss content across a wide range of topics. The platform’s structure divides it into communities known as “subreddits,” each focused on a specific subject or interest (from cars to movies to sports to knitting).</p>



<p>There are also promoted posts, which look like regular Reddit posts but are marked as sponsored. They can include text, images, videos, or carousels and often appear in users&#8217; feeds or within specific subreddits. Due to its size, Reddit has evolved into a major digital platform for both advertising and AI-powered data analysis.</p>



<p>Reddit introduced its “Reddit Community Intelligence” at the Cannes Lions International Festival of Creativity 2025. It described this new addition as the collective knowledge of billions of conversations to help businesses and organizations make “smarter marketing decisions.”</p>



<p>Last year, <a href="https://searchengineland.com/reddit-ai-powered-tools-ad-creation-446795" target="_blank" rel="noreferrer noopener nofollow">Reddit launched AI-powered advertising</a> such as an ads inspiration library, AI copywriter, and image auto-cropper to help small businesses create more effective, platform-specific ads.</p>



<p>The new tools, dubbed “Reddit Insights” and “Conversation Summary Add-ons” use AI to analyze conversations, summarize sentiment, and surface relevant user-generated content for advertisers.</p>



<p>Last year, <a href="https://www.cnbc.com/2024/03/15/ftc-investigating-reddit-over-ai-data-licensing-practices-ahead-of-ipo.html" target="_blank" rel="noreferrer noopener nofollow">the FTC advised Reddit</a> that it would conduct a non-public inquiry focused on Reddit&#8217;s sale, licensing, or sharing of user-generated content with third parties to train AI models. This was before Reddit <a href="https://redditinc.com/blog/reddit-and-oai-partner" target="_blank" rel="noreferrer noopener nofollow">announced</a> a partnership with OpenAI to bring Reddit content to ChatGPT.</p>



<p>When the FTC launched a Request for Information (RFI) to better understand how technology platforms deny or degrade users&#8217; access to services based on the content of their speech or affiliations, and how this conduct may have violated the law, without specifically mentioning Reddit, <a href="https://moneymorning.com/2025/02/20/ftc-inquiry-shakes-reddit-shares-to-years-low/" target="_blank" rel="noreferrer noopener nofollow">the company saw a 9% drop</a> in stock price.</p>



<p>The new tools will undoubtedly fuel the ongoing debates about the ethics of AI-driven analysis on Reddit, especially regarding user consent and the potential for privacy breaches.</p>



<p>In April, users of the r/ChangeMyView subreddit expressed outrage at the revelation that researchers at the University of Zurich were secretly using the site for an AI-powered experiment in persuasion, prompting the <a href="https://www.reddit.com/r/changemyview/comments/1k8b2hj/meta_unauthorized_experiment_on_cmv_involving/" target="_blank" rel="noreferrer noopener nofollow">moderation team to explain</a> that the experiment was conducted without authorization.</p>



<h2 class="wp-block-heading" id="h-careful-what-you-share">Careful what you share</h2>



<p>Given the open nature of Reddit it’s important to keep in mind that anything you post can be found by anyone and everything, including AI. So, it’s important to hold yourself to the same standards you may use when posting on social media.</p>



<p>On June 28, 2025 a new <a href="https://www.reddit.com/policies/privacy-policy" target="_blank" rel="noreferrer noopener nofollow">Privacy Policy</a> will go into effect. It stands to reason that you should be aware of the current policy and keep up with any changes.</p>



<p>A few general rules to help improve your privacy on the platform:</p>



<ul class="wp-block-list">
<li>Anonymity: there is no reason to use your real name or any identifying information in your username or profile. Don’t share personal details like your location, workplace, or other identifiers in posts or comments unless they are relevant to the post.</li>



<li>Don’t link to other social media profiles in your profile or posts. Also don’t link your account to your Google or Apple account.</li>



<li>If you’re active in several Reddit communities, consider creating separate accounts for different interests or sensitive topics.</li>



<li>In your Reddit account settings, under Privacy you can turn off “Show up in search results” to prevent your posts and comments from being indexed by search engines or easily browsed by others.</li>



<li>You can also disable “Personalize ads on Reddit based on information and activity from our partners.”</li>



<li>Protect your account using a unique, complex password and <a href="https://www.reddit.com/r/modguide/comments/k3zsu0/how_to_set_up_2_factor_authentication_for_your/">enable two-factor authentication (2FA) for your Reddit account</a>.</li>



<li>Regularly check your account activity for unauthorized access and report anything suspicious.</li>
</ul>



<p><strong>We don&#8217;t just report on threats &#8211; we help protect your social media</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your social media accounts by using <a href="https://www.malwarebytes.com/identity-theft-protection" target="_blank" rel="noreferrer noopener">Malwarebytes Identity Theft Protection</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/reddits-new-ai-powered-tools-scan-your-posts-to-serve-you-better-ads</link>
								<pubDate>Tue, 17 Jun 2025 10:43:13 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/reddits-new-ai-powered-tools-scan-your-posts-to-serve-you-better-ads</guid>
							</item>
														<item>
								<title><![CDATA[ The data on denying social media for kids (re-air) (Lock and Code S06E12) ]]></title>
								<description><![CDATA[ This week on the Lock and Code podcast, we revisit a 2024 interview with Dr. Jean Twenge about smartphones and the teen mental health crisis.  ]]></description>						
																		<category>Podcast</category>
																			<content:encoded><![CDATA[
<p><em>This week on the Lock and Code podcast&#8230;</em></p>



<p>Complex problems often assume complex solutions, but recent observations about increased levels of anxiety and depression, increased reports of loneliness, and lower rates of in-person friendships for teens and children in America today have led some school districts across the country to take direct and simple action: Take away the access to smartphones in schools. </p>



<p>Not everyone is convinced. </p>



<p>When social psychologist and author Jonathan Haidt proposed five solutions to what he called an &#8220;epidemic of mental illness&#8221; for young adults in America, many balked at the simplicity. </p>



<p><a href="https://www.platformer.news/anxious-generation-jonathan-haidt-debate-critique/?ref=platformer-newsletter" target="_blank" rel="noreferrer noopener">Writing for the outlet Platformer</a>, reporter Zoe Schiffer spoke with multiple behavioral psychologists who alleged that Haidt’s book cherry-picks survey data, ignores mental health crises amongst adults, and over-simplifies a complex problem with a blunt solution.&nbsp;And in speaking on the podcast Power User, educator Brandon Cardet-Hernandez argued that phone bans in schools would harm the students that need phones the most for things like translation services and coordinating rides back home from parents with varying schedules. </p>



<p>But Haidt isn&#8217;t alone in thinking that smartphones have done serious harm to teenagers and kids today, and many schools across America are taking up the mantle to at least remove their access in their own hallways. In February, Los Angeles Unified School District did just that, and a board member for the school district told the Lock and Code podcast that he believes the change has been for the better. </p>



<p>But for those still in doubt, there&#8217;s a good reason now to look back. </p>



<p>Today, on the Lock and Code podcast with host David Ruiz, we revisit a 2024 interview with Dr. Jean Twenge about her research into the differences in America between today&#8217;s teens and the many generations that came before. A psychologist and published author, Twenge believes she has found enough data tying increased smartphone use and social media engagement with higher strains on mental health. In today&#8217;s re-broadcast episode, Twenge explains where she believes there is a mental health crisis amongst today&#8217;s teens, where it is unique to their generation, and whether it can all be traced to smartphones and social media. </p>



<p>According to Dr. Twenge, the answer to all those questions is, pretty much, “Yes.” But, she said, there’s still some hope to be found.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“This is where the argument around smartphones and social media being behind the adolescent mental health crisis actually has, kind of paradoxically, some optimism to it. Because if that’s the cause, that means we can do something about it.”</p>
</blockquote>



<p>Tune in today to listen to the full conversation. </p>



<figure class="wp-block-embed is-type-rich is-provider-spotify wp-block-embed-spotify wp-embed-aspect-21-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">

</div></figure>



<p><em>Show notes and credits:</em><br><br>Intro Music: “Spellbound” by Kevin MacLeod (<a href="http://incompetech.com/" target="_blank" rel="noreferrer noopener">incompetech.com</a>)<br>Licensed under Creative Commons: By Attribution 4.0 License<br><a href="http://creativecommons.org/licenses/by/4.0/" target="_blank" rel="noreferrer noopener">http://creativecommons.org/licenses/by/4.0/</a><br>Outro Music: “Good God” by Wowa (unminus.com)</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p><strong>Listen up—Malwarebytes doesn’t just talk cybersecurity, we provide it.</strong></p>



<p>Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our&nbsp;<a href="https://try.malwarebytes.com/lockandcode/">exclusive offer for Malwarebytes Premium for Lock and Code listeners</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/podcast/2025/06/the-data-on-denying-social-media-for-kids-re-air-lock-and-code-s06e12</link>
								<pubDate>Mon, 16 Jun 2025 16:33:41 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/podcast/2025/06/the-data-on-denying-social-media-for-kids-re-air-lock-and-code-s06e12</guid>
							</item>
														<item>
								<title><![CDATA[ A week in security (June 9 &#8211; June 15) ]]></title>
								<description><![CDATA[ A list of topics we covered in the week of June 9 to June 15 of 2025 ]]></description>						
																		<category>News</category>
																				<category><![CDATA[ 23andMe ]]></category>
																				<category><![CDATA[ online scams ]]></category>
																			<content:encoded><![CDATA[
<p>Last week on Malwarebytes Labs:</p>



<ul class="wp-block-list">
<li><a href="/blog/news/2025/06/been-scammed-online-heres-what-to-do">Been scammed online? Here’s what to do</a></li>



<li><a href="/blog/news/2025/06/how-and-where-to-report-an-online-scam">How and where to report an online scam</a></li>



<li><a href="/blog/news/2025/06/google-bug-allowed-phone-number-of-almost-any-user-to-be-discovered">Google bug allowed phone number of almost any user to be discovered</a></li>



<li><a href="/blog/scams/2025/06/44-of-people-encounter-a-mobile-scam-every-single-day-malwarebytes-finds">44% of people encounter a mobile scam every single day, Malwarebytes finds</a></li>



<li><a href="/blog/news/2025/06/girlsdoporn-owner-faces-life-in-jail-after-pleading-guilty-to-sex-trafficking">GirlsDoPorn owner faces life in jail after pleading guilty to sex trafficking</a></li>



<li><a href="/blog/news/2025/06/23andme-raked-by-congress-on-privacy-sale-of-genetic-data">23andMe raked by Congress on privacy, sale of genetic data</a></li>



<li><a href="/blog/news/2025/06/us-airline-industry-quietly-selling-flight-data-to-dhs">US airline industry quietly selling flight data to DHS</a></li>



<li><a href="/blog/news/2025/06/your-meta-ai-chats-might-be-public-and-its-not-a-bug">Your Meta AI chats might be public, and it’s not a bug</a></li>
</ul>



<p>Last week on ThreatDown:</p>



<ul class="wp-block-list">
<li><a href="https://www.threatdown.com/blog/june-2025-microsoft-patch-tuesday-fixes-two-zero-days">June 2025 Microsoft Patch Tuesday fixes two zero-days</a></li>
</ul>



<p>Stay safe!</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/a-week-in-security-june-9-june-15</link>
								<pubDate>Mon, 16 Jun 2025 07:01:00 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/a-week-in-security-june-9-june-15</guid>
							</item>
														<item>
								<title><![CDATA[ Your Meta AI chats might be public, and it’s not a bug ]]></title>
								<description><![CDATA[ Users of the Meta AI seem to be sharing their sensitive conversations with the entire world without being aware of it ]]></description>						
																		<category>News</category>
																				<category>Privacy</category>
																				<category><![CDATA[ Meta AI ]]></category>
																				<category><![CDATA[ privacy disaster ]]></category>
																				<category><![CDATA[ share ]]></category>
																			<content:encoded><![CDATA[
<p>Conversations that people are having with the Meta AI app are being exposed publicly, often without the users realizing it, revealing a variety of medical, legal, and private matters. The standalone app and the company&#8217;s integrations with artificial intelligence (AI) across its platforms—Facebook, Instagram, and WhatsApp—are now facing significant scrutiny for such privacy lapses. </p>



<p>The past two years have seen an explosion in generative AI tools, such as ChatGPT, Anthropic&#8217;s Claude, Google Gemini, and more. But with new players entering the market almost daily, not all of them deserve the same level of trust.</p>



<p>With <a href="https://www.cnbc.com/2025/05/28/zuckerberg-meta-ai-one-billion-monthly-users.html" target="_blank" rel="noreferrer noopener nofollow">1 billion active monthly users</a>, Meta AI is one of the contenders aiming for ChatGPT’s crown. To monetize this success, Meta’s CEO Zuckerberg said “there will be opportunities to either insert paid recommendations” or offer “a subscription service so that people can pay to use more compute.”</p>



<p>Similar to ChatGPT, Meta AI can generate text, answer questions, and help users plan, brainstorm, and strategize on various issues. But when using the Meta AI app, after submitting a question, users can also press a &#8220;share&#8221; button, which directs them to a screen showing a preview of the post, which users can then publish. But some users appear blissfully unaware that they are sharing these text conversations, audio clips, and images <strong>publicly</strong> with the world.</p>



<p>Other users can access “shared” conversations by using the apps Discover feed.</p>



<p>With only one glance at that feed, I found this example of a conversation the user might not have wanted to be publicly visible. A teacher shared an email thread regarding their upcoming arbitration of a job termination that felt unjust. The Meta AI app responded: </p>



<figure class="wp-block-image size-full"><img loading="lazy" width="605" height="144" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2025/06/image.jpg" alt="example of a teacher sharing a story of unfair termination" class="wp-image-250467" /></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“Hello {name}, it&#8217;s great to hear from you again. I can sense the emotional weight of revisiting this experience, and <strong>I appreciate your trust in sharing it with me</strong>. It sounds like a really tough situation, and I&#8217;m here to listen and support you as you process it. No rush, take your time to gather your thoughts, and we can continue the conversation whenever you&#8217;re ready. How&#8217;s the preparation for the arbitration going so far?”</p>
</blockquote>



<p>The emphasis is by me. If the AI realizes how much trust it takes to share that story with anyone, even if it’s only a bot, then how must it feel when the user finds out the whole world can find and read it. I didn’t even have to log in to find this conversation.</p>



<p><a href="https://techcrunch.com/2025/06/12/the-meta-ai-app-is-a-privacy-disaster/" target="_blank" rel="noreferrer noopener nofollow">TechCrunch</a> reported about people asking for help with tax evasion and other personal matters, calling Meta AI a “privacy disaster.” Many sources found threads about medical topics, and other conversations about delicate and private issues.</p>



<p>What people may not realize is that if they use the integrated versions on social media, they are logged in and their conversation can be tied to their social media profile.</p>



<h2 class="wp-block-heading" id="h-how-to-not-share-your-chats-with-meta-ai">How to not share your chats with Meta AI</h2>



<p>Your best option would be not to use Meta AI at all. If you do, make sure you are not logged in and double check that fact if you are logged in on any of the Meta platforms on the same device. And never, ever use the Share button unless you mean to.</p>



<p>Meta spokesperson Daniel Roberts wrote in an emailed statement to <a href="https://www.wired.com/story/meta-artificial-intelligence-chatbot-conversations/" target="_blank" rel="noreferrer noopener nofollow">WIRED</a> that users’ chats with Meta AI are private unless users go through a multistep process to share them on the Discover feed.</p>



<p>When asked about these mishaps, the Meta AI chatbot said:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“Some users might unintentionally share sensitive info due to misunderstandings about platform defaults or changes in settings over time.”</p>
</blockquote>



<p>However, Meta has not provided detailed, easily accessible in-app guidance at the moment of sharing, which contributes to user confusion. I decided to ask Meta AI.</p>



<p><strong>Question</strong>: What do I need to do so you don&#8217;t share our conversation with the rest of the world? And is it true that the information I share with you might be used for advertising? Or, at least for &#8220;sponsored&#8221; recommendations?</p>



<p><strong>Answer</strong>: Your conversations with me are used to improve the model and might be reviewed by our team to ensure quality. We may also use your conversations to train our models to be more helpful and accurate. However, we take steps to protect your privacy.</p>



<p>If you have concerns about how your data is used, you can visit Meta&#8217;s Privacy Center to learn more about how Meta handles data: <a href="https://www.facebook.com/privacy/center/" target="_blank" rel="noreferrer noopener nofollow">https://www.facebook.com/privacy/center/</a>.</p>



<p>Did that actually answer my question? No.</p>



<p>So, here are the steps you may want to take if you decide to engage with Meta AI for all the different platforms where you may encounter it.</p>



<h3 class="wp-block-heading" id="h-meta-ai-app">Meta AI App</h3>



<ul class="wp-block-list">
<li>To ensure your prompts and conversations are only visible to you:
<ul class="wp-block-list">
<li>Tap your profile icon in the Meta AI app.</li>



<li>Go to <strong>Data &amp; Privacy</strong> under <strong>App settings</strong>.</li>



<li>Select <strong>Manage your information</strong>.</li>



<li>Set <strong>Make all your prompts visible to only you</strong>.</li>
</ul>
</li>



<li>Avoid using the <strong>Share</strong> button unless you are certain you want your conversation to appear publicly on the Discover feed.</li>
</ul>



<h3 class="wp-block-heading" id="h-whatsapp-facebook-and-instagram">WhatsApp, Facebook, and Instagram</h3>



<p>Note: Conversations with Meta AI on WhatsApp are not protected by end-to-end encryption and may be used for AI training</p>



<p>To limit Meta’s use of your data for AI training:</p>



<ul class="wp-block-list">
<li>Go to&nbsp;<strong>Settings &amp; Privacy &gt; Privacy Center</strong>.</li>



<li>Scroll to&nbsp;<strong>Privacy Topics</strong>&nbsp;and select&nbsp;<strong>AI at Meta</strong>.</li>



<li>Under <strong>Submit an objection request</strong> click Your messages with <strong>AIs on WhatsApp</strong> (or any of the other platforms you’re looking for) and fill out the form to request that Meta not use your data for AI training. <br></li>
</ul>



<h3 class="wp-block-heading" id="h-deleting-ai-conversation-data">Deleting AI conversation data</h3>



<p>Meta has introduced commands to delete information shared in any chat with an AI:</p>



<ul class="wp-block-list">
<li>For example, type&nbsp;/reset-ai&nbsp;in a conversation on Messenger, Instagram, or WhatsApp to delete your AI messages.</li>
</ul>



<p><strong>We don&#8217;t just report on threats &#8211; we help protect your social media</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your social media accounts by using <a href="https://www.malwarebytes.com/identity-theft-protection" target="_blank" rel="noreferrer noopener">Malwarebytes Identity Theft Protection</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/your-meta-ai-chats-might-be-public-and-its-not-a-bug</link>
								<pubDate>Fri, 13 Jun 2025 15:30:20 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/your-meta-ai-chats-might-be-public-and-its-not-a-bug</guid>
							</item>
														<item>
								<title><![CDATA[ US airline industry quietly selling flight data to DHS ]]></title>
								<description><![CDATA[ Flight data of US customers is being sold by several airlines through a joint data broker sending contracts to ICE and CBP.  ]]></description>						
																		<category>News</category>
																			<content:encoded><![CDATA[
<p>A data broker owned by some of America&#8217;s biggest airlines has been selling access to customer flight data to the US Department of Homeland Security (DHS).</p>



<p>The data, compiled by data broker Airlines Reporting Corporation (ARC), includes names, flight itineraries, and financial details. It also covers flights booked via US travel agencies.</p>



<p>ARC makes this data available to Customs and Border Protection (CBP), along with Immigration and Customs Enforcement (ICE), both of which were previously known as the US Customs Service until 2003, and both of which are offices under DHS.</p>



<p>ARC is owned and operated by eight major US airlines and is unique in being the only financial intermediary between the airline industry and US travel agencies, according to the data broker’s contract with ICE. ARC also provides payment settlement services for travel agencies and airlines, which has created a huge database of travel information that the data broker then makes available under its Travel Intelligence Program (TIP).</p>



<p>ARC’s most recently revealed contract, uncovered by tech news outlet by <a href="https://www.404media.co/airlines-dont-want-you-to-know-they-sold-your-flight-data-to-dhs/" target="_blank" rel="noreferrer noopener nofollow">404 Media</a>, is with US Customs and Border Protection. A statement of work with that agency revealed that the TIP pilot program &#8220;generated meaningful results to current [redacted] cases and will continue to do so once fully accessible to [redacted] analysts across [redacted] Offices.”</p>



<p>The CBP contract mandates silence from DHS on where it got the data. The statement of work, which began in June 2024 and could optionally run until June 2029, states that the CBP will &#8220;not publicly identify vendor, or its employees, individually or collectively, as the source of the Reports unless the Customer is compelled to do so by a valid court order or subpoena and gives ARC immediate notice of same.”</p>



<p>ARC’s contract with ICE, meanwhile, provides a view into the data obligations from travel agencies. As the contract stated:</p>



<p>&#8220;Daily, travel agencies must submit ticket sales and funds for over 240 airlines worldwide to ARC. This process enables ARC&#8217;s TIP, an essential intelligence tool integrated into HSI INTEL&#8217;s investigative mission.”</p>



<p>HSI INTEL stands for the Homeland Security Investigations Office of Intelligence. It investigates criminal networks, and also any &#8220;individual or organization that threatens national security or seeks to exploit the customs and immigration laws of the United States,&#8221; per the DHS website.</p>



<p>Those with access to the TIP database can search across 39 months of flight booking data. Flight itineraries and passenger name records, along with travel dates, flight dates, and even credit card numbers are available from the database.</p>



<p>Other agencies that have purchased access to the database include The Secret Service, the Securities and Exchange Commission, the Drug Enforcement Administration, and the US Marshals Service, according to 404 Media.</p>



<p>Delta, Southwest, United, Lufthansa, Air France, American Airlines, Air Canada, Alaska Airlines, and JetBlue all have seats on the ARC board. The company also partners with hundreds of airlines and travel agencies around the world.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/us-airline-industry-quietly-selling-flight-data-to-dhs</link>
								<pubDate>Wed, 11 Jun 2025 21:48:52 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/us-airline-industry-quietly-selling-flight-data-to-dhs</guid>
							</item>
														<item>
								<title><![CDATA[ 23andMe raked by Congress on privacy, sale of genetic data ]]></title>
								<description><![CDATA[ In a senate hearing, 23andMe was questioned about the impending take-over of the company and its trove of genetic data ]]></description>						
																		<category>News</category>
																				<category>Privacy</category>
																				<category><![CDATA[ 23andMe ]]></category>
																				<category><![CDATA[ implications ]]></category>
																				<category><![CDATA[ senate hearing ]]></category>
																			<content:encoded><![CDATA[
<p>In a Senate hearing adequately titled “23 and You: The Privacy and National Security Implications of the 23andMe Bankruptcy,” 23andMe executives addressed concerns about the privacy implications of the company’s sale and the handling of associated genetic data.</p>



<p>For those who missed the latest developments, in May 2025, <a href="https://www.malwarebytes.com/blog/news/2025/05/23andme-and-its-customers-genetic-data-bought-by-a-pharmaceutical-org" target="_blank" rel="noreferrer noopener">we reported</a> that 23andMe had agreed to sell itself to the pharmaceutical organization Regeneron for $256 million. In that agreed sale, Regeneron was also going to acquire the genetic data of 23andMe&#8217;s customers. But in early June, 23andMe&#8217;s former CEO Anne Wojcicki put forth a last-minute bid of $305 million, throwing Regeneron&#8217;s purchase into question, and placing 23andMe itself <a href="https://www.theguardian.com/technology/2025/jun/05/23andme-ceo-bid-anne-wojcicki" target="_blank" rel="noreferrer noopener nofollow">back on auction</a>. </p>



<p>The bid was made through the TTAM Research Institute, a nonprofit medical research organization recently set up by Wojcicki.</p>



<p>We explained earlier how consumers could (and why they maybe should) delete their genetic data from 23andMe. Apparently, people listened. Interim CEO Joe Selsavage said at the hearing that since the <a href="https://www.malwarebytes.com/blog/news/2025/03/23andme-bankruptcy-how-to-delete-your-data-and-stay-safe-from-the-2023-breach">company’s March bankruptcy filing</a>, 1.9 million of the company’s 15 million customers have chosen to delete their data.</p>



<p>Committee chairman James Comer said in opening remarks:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“It is imperative that 23andMe … ensure there is absolutely no legal or illegal way for foreign adversaries or anyone else to access or manipulate and abuse Americans’ genetic data to advance their nefarious agendas.”</p>
</blockquote>



<p>The urgency of the matter, undoubtedly enhanced by the <a href="https://www.malwarebytes.com/blog/news/2024/01/23andme-blames-negligent-breach-victims-says-its-their-own-fault">way 23andMe has handled data sales and breaches</a> in the past, lies in the impending sale of the company.</p>



<p>The committee criticized the company for failing to model the potential transfer of customers&#8217; genetic data in the upcoming sale with an &#8220;opt-in&#8221; framework, and ruled that 23andMe made it too cumbersome for consumers to delete the data—23andMe’s biggest asset in the sale.</p>



<p>US Representative Suhas Subramanyam of Virginia said:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“If there simply was a ‘delete my data’ page or button somewhere more prominent then I think it would be easier for a lot of people to feel that control.”</p>
</blockquote>



<p>During the hearing, interim CEO Selsavage and former CEO Wojcicki repeatedly declined to commit to establishing a customer opt-in mechanism, specifically one that would <em>require</em> consumers’ approval before their data could be sold and transferred to a new owner, despite multiple requests from committee members.</p>



<p>Beyond the threat of genetic data falling into foreign hands, many raised concerns that the sale could enable targeted advertising aimed at individuals with mental health conditions, drive up insurance premiums, or restrict access to credit.</p>



<p>23andMe assured the committee that regardless of who wins the auction, the company will not be sold to any entity unless it agrees to uphold the existing privacy policy.</p>



<p>23andMe’s <a href="https://www.23andme.com/legal/privacy/?srsltid=AfmBOorPdA8tqKrjs7cA5kPEUeh17ygxFc-mNlWLFMgmGDt4-hXJee0q" target="_blank" rel="noreferrer noopener nofollow">privacy statement</a> tells users that any new owner must adhere to its existing data protection guidelines, which include not providing user data to insurers, employers, public databases, or law enforcement without a court order, search warrant, or subpoena.</p>



<h2 class="wp-block-heading" id="h-what-can-consumers-do-to-protect-their-data">What can consumers do to protect their data?</h2>



<p>Customers should actively manage their data on 23andMe by reviewing policies, deleting data if desired, and staying vigilant about how their sensitive genetic information is used.</p>



<p>People that have submitted samples to 23andMe have three different options, each providing a different level of privacy.</p>



<p><strong>1. Delete your genetic data from 23andMe</strong></p>



<p>For 23andMe customers who want to delete their data from 23andMe:</p>



<ul class="wp-block-list">
<li>Log into your account and navigate to&nbsp;<strong>Settings</strong>.</li>



<li>Under&nbsp;<strong>Settings</strong>, scroll to the section titled&nbsp;<strong>23andMe data</strong>. Select&nbsp;<strong>View</strong>.</li>



<li>You will be asked to enter your date of birth for extra security.&nbsp;</li>



<li>In the next section, you’ll be asked which, if there is any, personal data you’d like to download from the company (make sure you’re using a personal, not public, computer). Once you’re finished, scroll to the bottom and select&nbsp;<strong>Permanently delete data</strong>.</li>



<li>You should then receive an email from 23andMe detailing its account deletion policy and requesting that you confirm your request. Once you confirm you’d like your data to be deleted, the deletion will begin automatically, and you’ll immediately lose access to your account.&nbsp;</li>
</ul>



<p><strong>2. Destroy your 23andMe test sample</strong></p>



<p>If you previously opted to have your saliva sample and DNA stored by 23andMe, but want to change that preference, you can do so from your account settings page, under “Preferences.”</p>



<p><strong>3. Revoke permission for your genetic data to be used for research</strong></p>



<p>If you previously consented to 23andMe and third-party researchers using your genetic data and sample for research, you may withdraw consent from the account settings page, under&nbsp;<strong>Research and Product Consents</strong>.</p>



<h2 class="wp-block-heading" id="h-check-if-you-were-caught-in-the-23andme-data-breach">Check if you were caught in the 23AndMe data breach</h2>



<p>Additionally, you may want to&nbsp;<strong>check if your data was exposed in the&nbsp;</strong><strong><a href="https://www.malwarebytes.com/blog/news/2023/12/23andme-says-er-actually-some-genetic-and-health-data-might-have-been-accessed-in-recent-breach">2023 data breach</a></strong>. We recommend that you run a scan using our&nbsp;<a href="https://www.malwarebytes.com/digital-footprint" target="_blank" rel="noreferrer noopener">free Digital Footprint Portal</a>&nbsp;to see if your data was exposed in the breach, and then to take additional steps to protect yourself (we’ll walk you through those).</p>



<div class="wp-block-malware-bytes-button mb-button" id="mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf"><div class="mb-button__row u-justify-content-center"><div class="mb-button__item mb-button-item-0"><p class="btn-main"><a href="https://www.malwarebytes.com/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1"></a><a href="https://www.malwarebytes.com/digital-footprint">SCAN NOW</a></p></div></div></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide" />



<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identity</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your—and your family&#8217;s—personal information by using <a href="https://www.malwarebytes.com/identity-theft-protection">identity protection</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/23andme-raked-by-congress-on-privacy-sale-of-genetic-data</link>
								<pubDate>Wed, 11 Jun 2025 18:09:29 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/23andme-raked-by-congress-on-privacy-sale-of-genetic-data</guid>
							</item>
														<item>
								<title><![CDATA[ GirlsDoPorn owner faces life in jail after pleading guilty to sex trafficking ]]></title>
								<description><![CDATA[ GirlsDoPorn owner pleaded guilty to sex trafficking through his coercive pornographic websites. He now faces life in prison.  ]]></description>						
																		<category>News</category>
																			<content:encoded><![CDATA[
<p>Michael James Pratt, the owner of pornographic websites GirlsDoPorn and GirlsDoToys, has pleaded guilty to sex trafficking in a US court.</p>



<p>Pratt ran the websites, which lured and coerced young women into filming pornographic videos, from 2013 to 2019. Pratt and his accomplices lured women from across the US and Canada to San Diego, where the filming would take place in hotel rooms or short-term rental units.</p>



<p>The group would advertise via online sites including Craigslist. In some cases the advertisements would promote clothed modelling jobs. It would later transpire that the work involved performing in sex videos.</p>



<p>When women showed doubt about appearing in such videos, Pratt and his team would convince them that the videos they made would only be distributed to a small base of private collectors outside the US, and that no one who knew the women would ever see them. Pratt would also pay other young women known as &#8216;reference girls&#8217; to seal the deal by helping to persuade the victims, on the expectation that another young woman&#8217;s testimony would be more convincing.</p>



<h2 class="wp-block-heading" id="h-victims-were-coerced">Victims were coerced</h2>



<p>Once the victims arrived at the airport, they would be taken to the shoot, where Pratt and his accomplices would rush them into signing contracts without giving them copies.</p>



<p>The perpetrators would tell the women that the shooting sessions would be short, but in fact they would take hours. Pratt and his group would bully victims into having sex on camera, <a href="https://www.justice.gov/usao-sdca/pr/girlsdoporn-owner-michael-pratt-pleads-guilty-sex-trafficking" target="_blank" rel="noreferrer noopener nofollow">according to the FBI</a>. Sometimes they would refuse to let them leave until they completed the shoots, pressing the women to perform acts that they had previously declined. Pratt and his associates would threaten to cancel flights home or publish what had already been filmed if victims did not comply.</p>



<p>The operation, which ran from 2013 to 2019, targeted hundreds of people. It would post the videos on its own sites, which were available in the US for a subscription fee. The operators would also post free versions of the videos on giant adult content site Pornhub to drum up business. These were often viewed millions of times. It generated over $17 million in revenue for Pratt, who originally conceived the operation. When contacted by one victim and asked to remove a video from the site, Pratt did not reply.</p>



<h2 class="wp-block-heading" id="h-a-fugitive-from-justice">A fugitive from justice</h2>



<p>Pratt played various parts in the operation, including recruiting victims, transporting them to the shooting sessions, and filming. He had already been charged in a US court in 2019 but fled to Spain, making it onto the FBI&#8217;s most wanted list. The FBI extradited him in 2022 and he pleaded not guilty in March 2024 to 19 felony counts, including sex trafficking (of both adults and minors), production of child pornography, and conspiracy to commit money laundering.</p>



<p>The pornography operation had already ordered to pay $18 million to victims in 2021 after 22 women sued it for damages. The FBI has also prosecuted other people involved in the sites. Matthew Wolfe, who moved from New Zealand to begin working for Pratt in 2011 and who run multiple parts of the business, received a 14-year sentence in March 2024. Cameraman Theodore Gyi was sentenced to four years in 2022. Adult film performer Ruben Andre Garcia received 20 years on June 2021. Office manager Valerie Moser will be sentenced on September 12.</p>



<p>Pratt will be sentenced on September 8 this year on two counts. He faces a minimum sentence of fifteen years for sex trafficking, and a maximum penalty of life in prison. Another count of sex trafficking conspiracy also carries a maximum life sentence.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/girlsdoporn-owner-faces-life-in-jail-after-pleading-guilty-to-sex-trafficking</link>
								<pubDate>Tue, 10 Jun 2025 21:29:19 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/girlsdoporn-owner-faces-life-in-jail-after-pleading-guilty-to-sex-trafficking</guid>
							</item>
														<item>
								<title><![CDATA[ 44% of people encounter a mobile scam every single day, Malwarebytes finds ]]></title>
								<description><![CDATA[ A mobile scam finds most people at least once a week, new Malwarebytes research reveals. The financial and emotional consequences are dire.  ]]></description>						
																		<category>News</category>
																				<category>Scams</category>
																				<category><![CDATA[ AI ]]></category>
																				<category><![CDATA[ Mobile ]]></category>
																				<category><![CDATA[ scam ]]></category>
																			<content:encoded><![CDATA[
<p>It’s become so troublesome owning a phone.</p>



<p>Malicious texts pose as package delivery notifications, phishing emails impersonate trusted brands, and unknown calls hide extortion attempts, virtual kidnapping schemes, or AI threats.&nbsp;Confusingly, even legitimate businesses now lean on outreach tactics that have long been favored by online scammers—asking people to scan QR codes, download mobile apps, and trade direct messages with, essentially, strangers.</p>



<p>All this junk is adding up, and it’s hurting everyday people.</p>



<p>According to new research conducted by Malwarebytes, 44% of people encounter a mobile scam every single day, while 78% encounter scams at least weekly. The victims of those scams—be they people who accidentally clicked on a link, filled out their information on a malicious webpage, or simply believed the person on the other side of a social media account—also suffered serious harms to their finances, emotions, and reputations. As Malwarebytes learned, 25% of scam victims were harassed or blackmailed, 19% had private info exposed, and 15% permanently lost their money.</p>



<p>As shared by one scam victim writing about their experience:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“I felt like I was in a horror movie. I never thought it would happen to me like this.”</p>
</blockquote>



<p>These are the latest findings from original research conducted by Malwarebytes to understand the reach, frequency, and impact that mobile scams have across multiple countries. By surveying 1,300 people over the age of 18 in the US, UK, Austria, Germany, and Switzerland, Malwarebytes can reveal a mobile reality full of tension: high concern, low action, and increasingly blurred lines between what’s safe and what’s not.</p>



<p>The complete findings can be found in the latest report, “Tap, swipe, scam: How everyday mobile habits carry real risk.” You can read the full report below.</p>



<div class="wp-block-malware-bytes-button mb-button" id="mb-button-b5b81e9e-bbeb-41f8-a32d-af85602c5280"><div class="mb-button__row u-justify-content-center"><div class="mb-button__item mb-button-item-0"><p class="btn-main"><a href="https://www.malwarebytes.com/mobile-scams">Read the report</a></p></div></div></div>



<p>Here are some of the key findings:</p>



<ul class="wp-block-list">
<li>77% of people worry about mobile scams and threats. The biggest fears are around financial loss and fraud (73%), account and device lockout (70%), and identity theft (68%).</li>



<li>66% worry about the future of AI and how realistic scams are going to become.</li>



<li>Just 15% of people strongly agreed: “I am confident in my ability to tell when something on my mobile phone is a scam.”</li>



<li>74% of people have encountered a social engineering scam in their lives, such as phishing attempts, fake FedEx notifications, or romance scams, and 36% have fallen victim.</li>



<li>37% of people have encountered an extortion scam and 17% have fallen victim, including 7% who were harmed specifically by a sextortion scam. &nbsp;</li>



<li>10% of people have a “safe word” in their family to “protect against things like kidnapping and extortion scams.”</li>



<li>52% of scam victims suffered financially: 18% had to freeze their credit, 15% lost money permanently, and 8% had accounts opened fraudulently in their name.</li>



<li>Only 20% of people use traditional security measures like antivirus, a VPN, and identity theft protection.</li>



<li>25% of people do not worry about scams at all because “it’s not something I can control.”</li>
</ul>



<p>This is the mobile world that the public is forced to live in, and the mobile world that future generations may soon inherit. While broad, bold action is required to meaningfully catch and stop scammers, everyday people can lean on many cybersecurity best practices to stay safe and secure online. From using unique passwords, to implementing multifactor authentication (MFA), there is plenty at hand to make life more difficult for scammers. </p>



<p>Importantly, there&#8217;s also help from Malwarebytes. </p>



<p>With the launch of our free, AI-powered digital safety companion <strong>Scam Guard</strong>, users can review any concerning text, email, phone number, link, image, or online message and receive on the spot guidance to avert and report scams. Try it today and remove the fear from being online. </p>



<p>Scam Guard is available for both free and paid users of Malwarebytes Mobile Security (iOS and Android), without having to install an additional app. &nbsp;</p>



<p>Try it out for yourself:&nbsp;<a href="https://app.malwarebytes.com/AgCJ/grb5w2g1" target="_blank" rel="noreferrer noopener">Download Malwarebytes Mobile Security for iOS or Android</a>. &nbsp;</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/scams/2025/06/44-of-people-encounter-a-mobile-scam-every-single-day-malwarebytes-finds</link>
								<pubDate>Tue, 10 Jun 2025 12:59:00 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/scams/2025/06/44-of-people-encounter-a-mobile-scam-every-single-day-malwarebytes-finds</guid>
							</item>
														<item>
								<title><![CDATA[ Google bug allowed phone number of almost any user to be discovered ]]></title>
								<description><![CDATA[ Google has fixed a vulnerability in its account recovery flow which could have allowed attackers to find linked phone numbers. ]]></description>						
																		<category>Exploits and vulnerabilities</category>
																				<category>News</category>
																				<category><![CDATA[ Google ]]></category>
																				<category><![CDATA[ phone number ]]></category>
																				<category><![CDATA[ recovery ]]></category>
																			<content:encoded><![CDATA[
<p>Google has fixed vulnerabilities that made it possible to retrieve the phone numbers of almost any Google user. The flaw was found in the flow that allows users to recover their Google account using a phone number.</p>



<p>A <a href="https://brutecat.com/articles/leaking-google-phones" target="_blank" rel="noreferrer noopener nofollow">cybersecurity researcher called Brutecat</a> was able to figure out the phone number linked to any Google account, information that is usually not public and is considered sensitive.</p>



<p>Brutecat found that the page where users can recover their Google account if they have forgotten their login details lacked BotGuard protection. BotGuard is a cloud-based cybersecurity solution designed to protect websites and web applications from malicious bots, automated attacks, crawlers, and scrapers.</p>



<p>However, BotGuard does not work on websites that do not use Javascript. This is because many of its advanced detection techniques rely on executing Javascript in the visitor’s browser to gather client-side data. If a website does not serve Javascript, or if a user or bot disables Javascript, BotGuard cannot collect the necessary information for fingerprinting or behavioral analysis.</p>



<p>Brutecat also had to use rotating IP addresses and a trick to bypass the occasional CAPTCHAs but was able to manage 40k requests per second. At that rate, if the attacker knew the country code of the phone number, it would take about 20 minutes in the US to find out the recovery phone number. In the UK that would come down to 4 minutes because they have shorter phone numbers.</p>



<p>For those doing the math and finding this is impossible, it’s important to know that Google displays the last two numbers of the phone number as a hint and Brutecat used Google&#8217;s own library &#8216;libphonenumber&#8217; to generate valid number formats.</p>



<p>But the researcher also needed the full display name of a targeted account. The researcher discovered a method to leak Google account display names by exploiting a feature in Looker Studio (formerly Google Data Studio). The researcher made a report/document in Google&#8217;s Looker Studio tool. Then changed the document&#8217;s owner to the victim&#8217;s Google account (using the victim&#8217;s email address). After transferring ownership, the victim&#8217;s full name automatically appeared on the Looker Studio home page&#8217;s &#8220;Recent documents&#8221; list even if the victim never opened the document, interacted with it, or knew about it. The key to this was finding that Looker Studio&#8217;s interface still displayed names for document transfers without requiring any action from the victim, unlike other Google services that now require prior interaction.</p>



<p>Google spokesperson Kimberly Samra told <a href="https://techcrunch.com/2025/06/09/google-fixes-bug-that-could-reveal-users-private-phone-numbers/" target="_blank" rel="noreferrer noopener nofollow">TechCrunch</a>:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“This issue has been fixed. We’ve always stressed the importance of working with the security research community through our vulnerability rewards program and we want to thank the researcher for flagging this issue. Researcher submissions like this are one of the many ways we’re able to quickly find and fix issues for the safety of our users.”</p>
</blockquote>



<p>Google also says it’s not aware of any confirmed reports about exploits of these vulnerabilities.</p>



<p>Nonetheless, a weakness allowing an attacker to trace phone numbers to Google accounts like this creates a massive risk for phishing and SIM-swapping attacks—especially since the majority of users will have their primary phone number as their account recovery number.</p>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide" />



<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identity</strong></p>



<p>Cybersecurity risks should never spread beyond a headline. Protect your—and your family&#8217;s—personal information by using <a href="https://www.malwarebytes.com/identity-theft-protection">identity protection</a>.</p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/google-bug-allowed-phone-number-of-almost-any-user-to-be-discovered</link>
								<pubDate>Tue, 10 Jun 2025 12:38:30 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/google-bug-allowed-phone-number-of-almost-any-user-to-be-discovered</guid>
							</item>
														<item>
								<title><![CDATA[ How and where to report an online scam ]]></title>
								<description><![CDATA[ Find out where and how victims can report online scams to prevent more victims and possibly recover funds. ]]></description>						
																		<category>News</category>
																				<category>Scams</category>
																				<category><![CDATA[ Canada ]]></category>
																				<category><![CDATA[ facebook ]]></category>
																				<category><![CDATA[ online scsams ]]></category>
																				<category><![CDATA[ report ]]></category>
																				<category><![CDATA[ uk ]]></category>
																				<category><![CDATA[ us ]]></category>
																				<category><![CDATA[ whatsapp ]]></category>
																			<content:encoded><![CDATA[
<p>If you&#8217;ve been scammed it&#8217;s really important to report it, if you can, in order to help prevent others falling for the same scam, and give authorities a chance to catch the criminal who did it.</p>



<p>The methods in which to report a scam varies according to the country you&#8217;re in, the platforms you&#8217;re using, and the outcome of the scam, so here are the most common methods you may need. Remember to report to both the authorities and the platforms the scammers are using.</p>



<h2 class="wp-block-heading" id="h-how-to-report-a-scam-in-the-united-states">How to report a scam in the United States</h2>



<ul class="wp-block-list">
<li><strong>Report to the FBI’s Internet Crime Complaint Center (IC3):</strong> File a complaint online at <a href="https://www.ic3.gov/" target="_blank" rel="noreferrer noopener nofollow">ic3.gov</a> as soon as possible. This is the main hub for cybercrime reports and helps with investigations and to gather intelligence about scams and the people behind them. Rapid reporting can also help support the recovery of lost funds.</li>



<li><strong>Contact local law enforcement:</strong>&nbsp;If you lost money, you should also file a report with your local police department.</li>



<li><strong>Notify your bank or credit card company:</strong>&nbsp;Inform them about the fraud in order to freeze accounts or reverse charges where possible.</li>
</ul>



<h2 class="wp-block-heading" id="h-how-to-report-a-scam-in-canada">How to report a scam in Canada</h2>



<ul class="wp-block-list">
<li><strong>Canadian Anti-Fraud Centre (CAFC):</strong> Call 1-888-495-8501 or report <a href="https://antifraudcentre-centreantifraude.ca/report-signalez-eng.htm#a1a" target="_blank" rel="noreferrer noopener nofollow">online</a>. The CAFC collects fraud reports nationwide and coordinates with law enforcement and the National Cybercrime Coordination Centre (NC3).</li>



<li><strong>Local police:</strong>&nbsp;Report the scam to your local police department, especially if you lost money.</li>



<li><strong>Credit bureaus:</strong>&nbsp;It is advisable to contact Equifax Canada and TransUnion Canada to order a free credit report immediately and ask that a fraud alert be put on your file.</li>



<li><strong>Financial institutions:</strong>&nbsp;Notify your bank or credit card issuer immediately, but also to the financial institution that transferred the money in case that’s a different one.</li>
</ul>



<h2 class="wp-block-heading" id="h-how-to-report-a-scam-in-the-united-kingdom">How to report a scam in the United Kingdom</h2>



<ul class="wp-block-list">
<li><strong>Action Fraud:</strong> Report online at <a href="https://www.actionfraud.police.uk/" target="_blank" rel="noreferrer noopener nofollow">actionfraud.police.uk</a> or call 0300 123 2040 (Monday to Friday, 8 am to 8 pm). Action Fraud is the national reporting center for fraud and cybercrime. It collects reports about fraud on behalf of the police in England, Wales and Northern Ireland. For fraud in Scotland please report it directly to Police Scotland.</li>



<li><strong>Local police:</strong>&nbsp;For urgent matters or ongoing threats, contact your local police. If the police decide not to investigate your case as a crime, you might still be able to get compensation or money back by bringing a civil case yourself. Talk to a solicitor or asset recovery agent to find out more.</li>



<li><strong>Financial institutions:</strong>&nbsp;Alert your bank or credit card company to suspicious transactions.</li>
</ul>



<h2 class="wp-block-heading" id="h-reporting-scams-on-popular-platforms">Reporting scams on popular platforms</h2>



<p>In all countries it’s also helpful to report on the platforms where the scam took place or was initiated. Use built-in reporting tools on platforms like Facebook and WhatsApp to report scam accounts or messages:</p>



<h3 class="wp-block-heading" id="h-whatsapp">WhatsApp</h3>



<ul class="wp-block-list">
<li>Open the chat with the suspicious business or individual.</li>



<li>Tap the business name or contact info at the top.</li>



<li>Scroll down and select <strong>Report Business</strong> or <strong>Report Contact</strong>.</li>



<li>Block the contact to stop further messages. The last five messages in the chat will be sent to WhatsApp.</li>
</ul>



<h3 class="wp-block-heading" id="h-facebook">Facebook</h3>



<ul class="wp-block-list">
<li>Click the three dots on the post, profile, or message you want to report.</li>



<li>Select&nbsp;<strong>Find support or report post/profile/message</strong>.</li>



<li>Follow the prompts to specify whether it’s a scam or fraudulent activity.</li>



<li>Facebook reviews these reports and may remove or restrict the scammer’s account so they can’t use that account anymore to defraud others.</li>
</ul>



<h3 class="wp-block-heading" id="h-other-platforms-e-g-instagram-x-ebay">Other platforms (e.g. Instagram, X, eBay)</h3>



<ul class="wp-block-list">
<li>Look for “Report” or “Help” links on the profile or message.</li>



<li>Follow platform-specific instructions to flag fraudulent behavior.</li>



<li>Provide as much detail as possible about the scam.</li>
</ul>



<p></p>
]]></content:encoded>
																	<link>https://www.malwarebytes.com/blog/news/2025/06/how-and-where-to-report-an-online-scam</link>
								<pubDate>Mon, 09 Jun 2025 20:09:43 GMT</pubDate>
								<guid>https://www.malwarebytes.com/blog/news/2025/06/how-and-where-to-report-an-online-scam</guid>
							</item>
											</channel>
			</rss>
			