Rich Stein (he/him) · @RichStein
452 followers · 4388 posts · Server econtwitter.net

"Cybercriminals sell access to these compromised government accounts across a variety of forums and groups chats...
...
Many of the adverts explicitly say that buyers can use these email accounts to then make Emergency Data Requests, or EDRs. EDRs are a common mechanism across social media or tech companies designed to provide user data to law enforcement in high stakes situations."
404media.co/buying-and-selling @josephcox v @404mediaco

#cybercrime #hacking #fraud #extortion #crime #EDR #impersonation

Last updated 1 year ago

Tobia Alberti · @tobiaalberti
273 followers · 482 posts · Server hachyderm.io
Poetry News · @haikubot
927 followers · 9915 posts · Server mastodon.cloud

X attempts to defend
From impersonation screen
By introducing IDs
Where all persons in need
May to verify proceed
For a safe and sound scene

engadget.com/x-may-soon-add-id

#x #verification #id #impersonation #poetry

Last updated 1 year ago

OccuWorld · @OccuWorld
171 followers · 291 posts · Server hear-me.social
Nonilex · @Nonilex
675 followers · 2736 posts · Server masto.ai

Among the 18 others w/ is .

Charges:

Violation of the GA Act;

3 counts of of violation of by a public officer;

3 counts of false statements & writings;

6 :
• 1 to commit of a public officer;
• 2 to commit first-degree ;
• 2 to commit false statements & writings; &
• 1 to commit filing false documents.

washingtonpost.com/national-se

#indicted #trump #rudygiuliani #giuliani #georgia #rico #solicitation #oath #conspiracies #conspiracy #impersonation #forgery

Last updated 1 year ago

News18 India · @News18India
15 followers · 1614 posts · Server india.goonj.xyz

A case under sections 419 (cheating) and other relevant provisions of the Indian Penal Code and Foreign Nationals Act was registered against one Veera Rose at Taloja police station

news18.com/india/ugandan-woman

#ugandanwomanbooked #cheating #impersonation #navimumbai

Last updated 1 year ago

Shawn M. Jones, PhD · @shawnmjones
440 followers · 3452 posts · Server hachyderm.io

@alastair Yes. If a handle is not being used, someone else can scoop it up. There have been cases of where a scammer scooped up an old handle and modeled their account after the person they were impersonating.

Here's a paper on reusing handles: doi.org/10.1145/3038912.305258

#impersonation #Twitter #riptwitter #twittermigration #twitterisdead

Last updated 1 year ago

Shawn M. Jones, PhD · @shawnmjones
440 followers · 3452 posts · Server hachyderm.io

@ArrestJK Per people knowing me better:

2. I'm not so worried about existing colleagues, but new ones that find old work. Do I need to be concerned that potential colleagues may not understand the nature of Twitter and account impersonation? I've noticed that those from fields outside of computing may not be so saavy when they use social media. Even saavy users are occasionally fooled by with slightly different usernames.

#impersonation #twittermigration #riptwitter

Last updated 1 year ago

Shawn M. Jones, PhD · @shawnmjones
437 followers · 3412 posts · Server hachyderm.io

The final step of the is leaving the platform altogether.

How does one manage their risk?

I have my handle on slides, cards, and a host of other items that I've distributed during my academic career.

Once I leave Twitter (or get kicked out) and someone co-opts my username, how do I ensure that visitors know that the current owner of the username is no longer me? How does one manage ? Ideas?

#twittermigration #brand #Twitter #impersonation #riptwitter #twitterisdead #twitterdown #brandrisk

Last updated 1 year ago

CryptoNewsBot · @cryptonewsbot
645 followers · 32662 posts · Server schleuss.online
CryptoNewsBot · @cryptonewsbot
645 followers · 32659 posts · Server schleuss.online

'Scammers' impersonate Crypto Twitter users on Threads as users near 100M - Threads are already seeing potential crypto scammers arrive on th... - cointelegraph.com/news/crypto-

#hack #meta #scams #crypto #twitter #threads #scammers #phishing #impersonation

Last updated 1 year ago

it's kat! · @kathimmel
1365 followers · 13357 posts · Server mstdn.social
Martin Holland · @mho
949 followers · 803 posts · Server social.heise.de

Impersonation Rampant on as Musk Ends Verification System – @RollingStone

Now that the legacy s are gone, users are free to pose as celebrities and government agencies

"As predicted by almost its entire user base, Twitter CEO ’s decision to do away with its free identity- system on Thursday has unleashed a torrent of , , and general anarchy."

rollingstone.com/culture/cultu

#twitter #bluecheck #elonmusk #verification #impersonation #misinformation #twittertakeover #socialmedia

Last updated 2 years ago

· @badiucaomirror
1 followers · 1690 posts · Server mastodonchina.com

Someone registered Telegram yesterday using my China number. It isn't me. Pls be aware. 我没有用中国手机号码注册过tg,望周知。 h…

#impersonation

Last updated 2 years ago

dispatch · @dispatch
536 followers · 3046 posts · Server ioc.exchange
LizfromBriz · @DrLiz
718 followers · 280 posts · Server aus.social

Twitter is weird. someone has a Twitter account impersonating my long deceased Grandfather Frank Forde. The dates on the account are wrong (Frank lived from 1890 to 1983) but it is a photo of Frank and is generally about his party - the Australian Labor Party.
Frank had the honour of being Australia’s shortest serving Prime Minister - sworn in after John Curtin died (he was Curtain’s Deputy) but defeated by Chifley in the leadership vote some days later. I did question this person some years ago when I discovered the account but they didn’t reply.

#identity #impersonation #twitter #alp #auspol

Last updated 2 years ago

Luca · @securescientist
267 followers · 6 posts · Server fediscience.org

Latest by @alphacentauri and me. Two years of strenuous data collection funneled into what I think is one of the most rigorous analyses out there for data.

We employ and extend the cyber risk model by @danielwwoods and Böhme to contextualize and evaluate which victim characteristic drive attackers preferences when launching attacks.

The paper will be presented at Usenix Security 2023 this summer. Preprint: arxiv.org/pdf/2303.03249.pdf

#infosec #impersonation #cyber #cybercrime

Last updated 2 years ago

Steven Saus [he/him] · @StevenSaus
445 followers · 7841 posts · Server faithcollapsing.com

From 06 Mar: Thousands scammed by AI voices mimicking loved ones in emergencies - EnlargeArtemisDiana iStock / Getty Images Plus AI models designed to closely ... arstechnica.com/tech-policy/20 -scam

#policy #phone #impersonation #fraud #ai

Last updated 2 years ago

IT News · @itnewsbot
2973 followers · 251846 posts · Server schleuss.online

Thousands scammed by AI voices mimicking loved ones in emergencies - Enlarge (credit: ArtemisDiana | iStock / Getty Images Plus)

AI... - arstechnica.com/?p=1922001

#ai #fraud #policy #phonescam #impersonation

Last updated 2 years ago

Tech news from Canada · @TechNews
325 followers · 8780 posts · Server mastodon.roitsystems.ca

Ars Technica: Thousands scammed by AI voices mimicking loved ones in emergencies arstechnica.com/?p=1922001

#Tech #arstechnica #it #technology #impersonation #PhoneScam #policy #fraud #ai

Last updated 2 years ago