Sextortion scammers getting creative

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Read more

The lucrative business of Bitcoin sextortion scams (updated)

Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.

Read more

A week in security (April 8 – 14)

A roundup of news stories from April 8–14, including Baldr, medical management apps, an Android password stealer, and new sextortion scams.

Read more

Select your language