‘This happens frequently,’ AARP Alabama warns of Venmo, Cash App scams

Scammers are using payments apps, like Venmo and Cash App, to swipe innocent people’s money. AARP Alabama says there are multiple mobile payment scams going around right now, and one scam takes place directly in your app.

Hackers are using Facebook ads to infect Windows PCs with password-stealing malware — how to stay safe | Tom’s Guide

Clicking on one of these fake ads takes potential victims to malicious sites hosted on Google Sites or True Hosting which appear to be download pages for the themes or software advertised on Facebook. These sites have a download button that when clicked, downloads a ZIP file with a name that matches the product advertised online.

Six Types of Social Engineering Attacks

Some examples of social engineering attacks include phishing, pretexting, scareware, baiting, vishing, smishing and CEO fraud. If you are unsure what qualifies as social engineering, imagine how many ways someone can manipulate you to reveal private information. Threat actors use these psychological techniques, both in person and online, to gain access to your personal or organizational information. These bad actors can install malware on your device, steal your information and even take your identity.

How to Identify and Protect Against Phishing Attacks

Data brokers collect your personal information from various sources and compile detailed profiles. That’s why cybercriminals love data brokers. They hoard your info from everywhere: public records (voter rolls, property ownership), online stuff (browsing history, social media profiles, newsletter signups), and even commercial sources (loyalty programs, purchases). This intel helps them craft compelling and realistic phishing scams or impersonate you or trusted sources to steal private info or money.

Are you ready to trust your next ride to a robot chauffeur? | Fox News

Scientists at the University of Tokyo, led by Dr. Kento Kawaharazuka, have taken a novel approach to this problem. Instead of creating a fully autonomous vehicle, they’ve developed a robot that can drive a regular car.

How to stay safe from cybercriminal “quishing” attacks | TechRadar

Phishing works so well because it relies on hacking the human psyche. We want to trust the stories we’re told – especially if they’re told by ostensibly trustworthy organizations or individuals. This is an admirable, but highly exploitable, trait. As technologies evolve, threat actors are continually refining the methods they use to take advantage of trusting end-users.

FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites | TechCrunch

Forced action means requiring the consumer to take some sort of step to access specific functionality, like filling out their payment details to participate in a free trial — something that 66.4% of the websites and apps in the study had required.

Tech that’s turning big rigs, trucks, even tanks into self-driving vehicles | Fox News

Kodiak Robotics is at the forefront of this revolution, developing cutting-edge autonomous technology that’s set to transform the trucking industry. But the big question is: Are we as a society ready for this leap?

Beware Of Malicious PDF Files That Mimic As Microsoft 2FA Security Update

Phishing attacks are evolving to use QR codes to trick users into entering their credentials on malicious websites, which can be designed to look like legitimate login pages and may even prefill the username field to increase believability. 

What happens when a Waymo gets pulled over in Phoenix?

As self driving cars show up in more cities, new laws will be needed to determine how to treat traffic infractions. https://www.azcentral.com/story/news/local/arizona/2024/07/02/what-happens-when-a-waymo-gets-pulled-over-in-phoenix/74197111007/