• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - identity theft
Tag:

identity theft

Tech

Android Malware Taps Google Gemini at Runtime

by Chief Editor February 20, 2026
written by Chief Editor

Android Malware Enlists AI: A New Era of Mobile Threats

A newly discovered Android malware strain, dubbed “PromptSpy” by security firm Eset, is leveraging Google’s Gemini generative AI model to enhance its persistence mechanisms. This marks the second known instance of AI-driven mobile malware, signaling a concerning trend in the cybersecurity landscape.

How PromptSpy Works: AI-Powered Persistence

Unlike traditional malware that relies on static code and pre-defined instructions, PromptSpy dynamically adapts to its environment. It captures an XML dump of the user’s screen, including text labels and coordinates, and sends this data to Gemini. The AI model then provides JSON-formatted instructions on which interface elements to tap or manipulate. PromptSpy executes these actions locally, repeating the process until it achieves persistence on the device.

This innovative approach allows the malware to overcome the limitations of conventional automation scripts, which often fail due to variations in device layouts and manufacturer customizations. The malware’s ability to remain on a device even after a reboot is particularly noteworthy, as reboots have historically been considered a basic remediation step.

Accessibility Permissions and Removal Prevention

After installation, PromptSpy attempts to obtain AccessibilityService permissions – a common tactic among Android Trojans. Once granted, the malware employs removal prevention techniques, overlaying invisible interface elements over buttons like “stop,” “finish,” “clear,” or “Uninstall” to intercept user interaction and block removal attempts. The only reliable method for removing PromptSpy is to reboot the device into safe mode.

Capabilities Beyond Persistence

PromptSpy’s capabilities extend beyond simply maintaining its foothold on a device. It can also collect device information, upload lists of installed applications, capture lock screen PINs, record unlock patterns as video, report foreground app status, and capture screenshots.

Targeting and Origins

Researchers have traced PromptSpy samples to a website impersonating JPMorgan Chase under the name MorganArg, suggesting a focus on users in Argentina. Chinese-language strings within the malware’s codebase indicate potential development ties to a Chinese-speaking environment, though the activity has not been attributed to a known threat group.

The Rise of AI-Powered Malware: Following PromptLock

PromptSpy follows Eset’s August 2025 discovery of “PromptLock,” the first known GenAI-driven ransomware. PromptLock embedded a locally hosted large language model to dynamically generate encryption routines and malicious code at runtime. These two cases demonstrate a growing trend of threat actors experimenting with AI models to enhance the adaptability and effectiveness of their malware.

Future Trends: What’s Next for AI and Malware?

The emergence of PromptSpy and PromptLock signals a significant shift in the mobile threat landscape. We can expect to notice further development in several key areas:

More Sophisticated Evasion Techniques

AI will likely be used to develop malware that can dynamically evade detection by security tools. By analyzing system behavior and adapting its code in real-time, malware could become significantly harder to identify, and neutralize.

Automated Vulnerability Exploitation

AI could automate the process of identifying and exploiting vulnerabilities in mobile devices and applications. This could lead to a surge in zero-day attacks and a decrease in the time window for security teams to respond.

Personalized Phishing and Social Engineering

Generative AI can create highly personalized phishing messages and social engineering attacks, making them more convincing and difficult to detect. This could lead to a higher success rate for attackers and increased financial losses for victims.

AI-Driven Polymorphism

Malware could apply AI to constantly change its code, creating new variants that bypass signature-based detection systems. This polymorphism would make it challenging for security tools to preserve up with the evolving threat landscape.

FAQ

What is PromptSpy? PromptSpy is an Android malware that uses Google’s Gemini AI to automate its persistence on infected devices.

How does PromptSpy achieve persistence? It uses Gemini to analyze the screen and determine which interface elements to tap, allowing it to remain in the recent app list even after a reboot.

Is PromptSpy widespread? While the technical design is concerning, widespread deployment has not yet been confirmed.

What can I do to protect myself? Rebooting your device into safe mode is the most reliable way to remove PromptSpy. Be cautious when granting AccessibilityService permissions.

What is the significance of PromptSpy? It represents a new era of AI-powered malware, demonstrating how threat actors are leveraging AI to overcome traditional security measures.

Did you know? PromptSpy is the first known Android malware to use generative AI in its execution flow.

Pro Tip: Regularly review the permissions granted to apps on your Android device and revoke any that seem unnecessary or suspicious.

Stay informed about the latest mobile security threats and best practices. Explore more articles on endpoint security and cybercrime to protect yourself and your devices.

February 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Aflac: 22.6M impacted in cybersecurity breach | Local News

by Chief Editor December 21, 2025
written by Chief Editor

Aflac Breach: A Harbinger of Rising Healthcare Data Attacks?

The recent Aflac data breach, impacting approximately 22.65 million individuals, isn’t an isolated incident. It’s a stark reminder of the escalating threat landscape facing the healthcare and insurance industries. While Aflac acted swiftly to contain the breach and offer protective services, the event underscores a worrying trend: healthcare data is increasingly valuable – and therefore, increasingly targeted – by cybercriminals.

The Growing Value of Protected Health Information (PHI)

Why is healthcare data so attractive to hackers? Unlike credit card numbers, which can be quickly cancelled, PHI – including Social Security numbers, medical claims, and diagnoses – is incredibly persistent. It can be used for years to commit identity theft, insurance fraud, and even blackmail. According to the HIPAA Journal, healthcare data breaches exposed over 70 million records in 2023 alone, a significant increase from previous years. The average cost of a healthcare data breach in 2023 was a staggering $10.93 million, according to IBM’s Cost of a Data Breach Report 2023.

This isn’t just about financial gain. Nation-state actors are also increasingly interested in healthcare data, potentially for espionage or to disrupt critical infrastructure. The COVID-19 pandemic saw a surge in attacks targeting healthcare organizations, as hackers sought to exploit vulnerabilities and steal research data.

Beyond Ransomware: The Evolving Tactics of Attackers

While ransomware remains a dominant threat, attackers are diversifying their tactics. The Aflac breach, while details are still emerging, highlights the risk of data exfiltration – the theft of sensitive information – even without a full system lockdown. We’re seeing a rise in:

  • Supply Chain Attacks: Targeting third-party vendors who have access to healthcare data.
  • Business Email Compromise (BEC): Hackers impersonating executives to trick employees into transferring funds or revealing sensitive information.
  • Insider Threats: Malicious or negligent employees who compromise data security.
  • AI-Powered Attacks: The use of artificial intelligence to automate phishing campaigns and identify vulnerabilities.

Pro Tip: Regularly train employees on cybersecurity best practices, including phishing awareness and password security. Implement multi-factor authentication (MFA) wherever possible.

The Role of Supplemental Insurance in Data Security

Aflac’s response – offering credit monitoring and identity theft protection through CyEx Medical Shield – is a positive step. However, the incident raises questions about the security practices of supplemental insurance providers. These companies often handle a wealth of personal information, making them attractive targets.

The industry needs to move beyond simply reacting to breaches and proactively invest in robust cybersecurity measures. This includes:

  • Data Encryption: Protecting data both in transit and at rest.
  • Regular Security Audits: Identifying and addressing vulnerabilities.
  • Incident Response Planning: Having a clear plan in place to respond to and contain breaches.
  • Zero Trust Architecture: Assuming that no user or device is trustworthy and verifying access requests.

Future Trends: What to Expect

The future of healthcare data security will likely be shaped by several key trends:

  • Increased Regulation: Expect stricter regulations and enforcement related to data privacy and security.
  • AI-Driven Security Solutions: The use of AI to detect and respond to threats in real-time.
  • Blockchain Technology: Exploring the use of blockchain to secure and share healthcare data.
  • Cyber Insurance: Increased demand for cyber insurance to mitigate the financial impact of breaches.
  • Focus on Data Minimization: Collecting and storing only the data that is absolutely necessary.

Did you know? The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare organizations to protect the privacy and security of patient information, but compliance doesn’t guarantee immunity from attacks.

FAQ

Q: What should I do if I was affected by the Aflac breach?
A: Enroll in the free credit monitoring and identity theft protection services offered by Aflac. Monitor your credit reports and bank accounts for any suspicious activity.

Q: Is my health information safe with insurance companies?
A: Insurance companies are required to protect your health information, but no system is completely secure. Be vigilant about protecting your personal information.

Q: What is multi-factor authentication (MFA)?
A: MFA adds an extra layer of security by requiring you to provide two or more forms of identification to access an account.

Q: How can I protect myself from phishing scams?
A: Be wary of unsolicited emails or text messages asking for personal information. Verify the sender’s identity before clicking on any links or attachments.

Want to learn more about protecting your data? Explore our comprehensive guide to data security. Share your thoughts on this article and the growing threat of healthcare data breaches in the comments below!

December 21, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Palm Beach County woman gets 20 years for masterminding nationwide phone hijack scam

by Chief Editor December 18, 2025
written by Chief Editor

The Rising Tide of Phone Number Hijacking: What’s Next?

The recent sentencing of Kadesa Sayles, a Florida woman convicted of orchestrating a nationwide phone number hijacking scheme, is a stark reminder of a growing threat. Sayles received a 20-year prison sentence for defrauding victims out of significant sums, exploiting vulnerabilities in how we verify our digital identities. But this case isn’t an isolated incident; it’s a symptom of a much larger, evolving problem. Experts predict this type of fraud will become increasingly sophisticated and prevalent, demanding heightened awareness and proactive security measures.

How Phone Hijacking Works – And Why It’s So Effective

At its core, phone hijacking, also known as SIM swapping, relies on social engineering. Scammers convince mobile carriers to transfer a victim’s phone number to a SIM card they control. This is often achieved by posing as the account holder and exploiting weak verification processes. Once the number is transferred, the scammer can intercept text messages, including two-factor authentication (2FA) codes, granting access to a wide range of online accounts – banking, email, social media, and more.

The effectiveness lies in our reliance on phone numbers as a primary security measure. According to the FBI, reports of SIM swapping have been steadily increasing, with losses totaling millions of dollars annually. The agency notes that criminals are increasingly targeting cryptocurrency holders, leveraging hijacked numbers to bypass security measures on exchanges.

Pro Tip: Don’t share verification codes with anyone, even if they claim to be from your bank or mobile carrier. Legitimate organizations will *never* ask for this information over the phone or via text.

The Evolution of the Threat: Beyond SMS-Based 2FA

While SMS-based 2FA is a major vulnerability, the threat is expanding. Scammers are now employing more sophisticated techniques, including:

  • AI-Powered Social Engineering: Artificial intelligence is being used to create incredibly convincing phishing messages and voice calls, making it harder to distinguish between legitimate requests and fraudulent ones.
  • Account Takeover as a Service (ATOaaS): Criminals are offering hijacking services on the dark web, lowering the barrier to entry for less technically skilled fraudsters.
  • Exploiting “Find My Device” Features: As seen in the Sayles case, access to “Find My Device” features (like Apple’s Find My) can provide scammers with location data and further compromise accounts.

The rise of passkeys, a more secure authentication method, is a direct response to these vulnerabilities. Passkeys replace passwords and 2FA codes with cryptographic keys stored on your devices, making them far more resistant to phishing and hijacking attacks.

The Role of Mobile Carriers and Regulatory Bodies

Mobile carriers are under increasing pressure to improve their security protocols. The Federal Communications Commission (FCC) is currently considering rules to strengthen SIM swap protections, including requiring carriers to verify customer identities more rigorously before transferring phone numbers.

However, progress is slow. Many carriers still rely on outdated verification methods, and the industry as a whole has been hesitant to adopt more secure, but potentially less convenient, authentication processes. Industry collaboration and stricter regulations are crucial to stemming the tide of phone hijacking.

Protecting Yourself: A Multi-Layered Approach

Protecting yourself requires a proactive, multi-layered approach:

  • Enable Account Alerts: Set up alerts for any changes to your mobile account, including number transfers or device activations.
  • Use Authentication Apps: Switch from SMS-based 2FA to an authenticator app like Google Authenticator, Authy, or Microsoft Authenticator.
  • Consider a PIN or Password on Your Account: Add an extra layer of security to your mobile account by requiring a PIN or password for any changes.
  • Be Wary of Phishing Attempts: Be skeptical of unsolicited calls, texts, or emails asking for personal information.
  • Monitor Your Accounts Regularly: Check your bank accounts, credit reports, and online accounts for any suspicious activity.
Did you know? You can freeze your credit with all three major credit bureaus (Equifax, Experian, and TransUnion) to prevent identity theft.

Future Trends: What to Expect

The future of phone number hijacking will likely involve:

  • Increased Automation: Scammers will continue to automate their attacks, making them faster and more efficient.
  • Targeting of New Platforms: As new platforms and technologies emerge, scammers will find ways to exploit them.
  • Sophisticated Malware: Malware designed to steal phone numbers and intercept 2FA codes will become more prevalent.
  • Greater Focus on Biometric Authentication: Biometric authentication methods, such as fingerprint scanning and facial recognition, may become more widely adopted as a way to enhance security.

FAQ

Q: What is SIM swapping?
A: SIM swapping is when a scammer convinces your mobile carrier to transfer your phone number to a SIM card they control, allowing them to intercept your texts and calls.

Q: Can I get my phone number back if it’s been hijacked?
A: Yes, but it can be a lengthy and frustrating process. Contact your mobile carrier immediately and report the incident to the police.

Q: Is 2FA still useful if SMS is vulnerable?
A: Yes, but use an authenticator app instead of SMS-based 2FA for maximum security.

Q: What should I do if I suspect I’ve been targeted?
A: Immediately contact your mobile carrier, bank, and any other affected accounts. Change your passwords and monitor your accounts for suspicious activity.

Want to learn more about protecting your digital identity? Explore our comprehensive digital security guide. Share your experiences and concerns in the comments below – let’s work together to stay one step ahead of the scammers!

December 18, 2025 0 comments
0 FacebookTwitterPinterestEmail
Business

Credit card scam turns JB man’s life upside down

by Chief Editor May 18, 2025
written by Chief Editor

Navigating the Rising Tide of Digital Scams: Strategies and Trends for Protection

How Mobile Apps Are Changing the Scam Landscape

The case of Phoon Kin Fai highlights an emerging trend in digital scams: the exploitation of mobile app applications. Today’s consumers often manage financial tasks through mobile applications, making them attractive targets for scammers. According to the FBI’s Internet Crime Report, attempts to deceive consumers through mobile platforms have soared, making it crucial for users to practice caution. A robust digital literacy campaign can safeguard users by enhancing their ability to spot and prevent fraudulent activities.

Virtual Identity Theft: A Growing Concern

A key element in these scams is the unauthorized use of personal information. Phoon’s experience shows how easily personal data can be co-opted once submitted digitally. To counter this, users are encouraged to adopt multi-factor authentication and monitor their credit reports regularly. According to a study by Javelin Strategy & Research, identity theft attempts spiked by over 30% during the past year, underscoring the importance of digital hygiene.

Psychological Tactics and Their Evolving Tactics

Scammers increasingly rely on psychological manipulation to deceive their victims. By using specific details like Phoon’s application timeline, scammers gain the victim’s trust. This tactic, known as “contextual social engineering,” employs familiarity to create a veneer of legitimacy. The Better Business Bureau advises awareness about common psychological strategies used by scammers, such as urgency and authority impersonation, to help individuals stay vigilant.

Case Study: Proactive Measures Against Loan Shark Threats

In Phoon’s instance, the threat of violence by loan sharks was a critical scare tactic. Real-world data from the Loan Shark Prevention Unit of Singapore shows that individuals often succumb to these threats due to fear. Public awareness and legal support can empower victims to seek help. Establishing strong community networks and training programs can bolster resilience among at-risk populations.

Legal and Regulatory Measures: Solutions on the Horizon

The rise in digital scam cases necessitates stronger legal frameworks. There’s a growing call for authorities to impose harsher penalties to deter criminals. In Malaysia, for instance, authorities have recently enhanced penalties for digital fraud. By updating legal standards and employing advanced tracking technologies, law enforcement can better respond to this growing threat.

The Role of Collaboration in Combating Digital Fraud

Multi-stakeholder collaboration is crucial in addressing digital scams. Henry Mok’s initiative to liaise with credit card companies and law enforcement illustrates proactive community involvement, a model worth emulating. Cross-industry collaboration can leverage shared data and resources to outpace scammers. Governments, corporations, and NGOs must forge partnerships to fortify digital ecosystems.

FAQ

Q: What personal details should I never share over the phone?

A: Never share your full name, account numbers, or any personal identification numbers in response to unsolicited contacts.

Q: What are the first steps to take if I suspect a scam?

A: Immediately cease communication with the suspect. Report the incident to your bank and local law enforcement.

Did You Know?

Did you know that approximately 14 million people fall victim to internet scams annually, according to the Anti-Phishing Working Group? Always verify the source before sharing any personal information.

Pro Tip

Regularly update your passwords and use different passwords for different services to minimize the risk of unauthorized access to your accounts.

Looking Ahead: Technologies to Watch For

The fight against digital scams is closely tied to advancements in technology. Emerging tools, such as AI-driven anomaly detection systems, promise to offer real-time fraud alerts. As technology evolves, so too must our strategies to safeguard valuable personal data against ever-clever schemes. Businesses are encouraged to adopt integrated cybersecurity solutions that address both current and future threats.

Take Action

Staying informed is your first line of defense against digital scams. Visit our cybersecurity resources page for more tips on staying safe online, and subscribe to our newsletter for updates on the latest trends and prevention methods. Join the conversation in the comments below and share your experiences or insights to help strengthen community awareness.

May 18, 2025 0 comments
0 FacebookTwitterPinterestEmail
Business

18-year-old used stolen Giant Eagle points for gas

by Chief Editor March 29, 2025
written by Chief Editor

Protecting Digital Perks: The Rise of Fraud in Loyalty Programs

As digital transactions become increasingly prevalent, loyalty programs such as Giant Eagle‘s myPerks are both a blessing and a potential security risk. A recent case saw an 18-year-old allegedly stealing over $670 in points, highlighting the vulnerabilities within these systems. What future trends should businesses and consumers watch for to safeguard digital perks?

Trends in Fraud Prevention and Future Technologies

The rise of mobile app-based loyalty programs has opened new avenues for fraud. However, advanced technologies are being developed to counter such threats. Multi-factor authentication (MFA) and biometric verification are rapidly becoming standard practices. According to a 2024 report by CyberEdge, 80% of companies are already implementing MFA, a significant step in enhancing security.

Real-Life Cases: Insights and Preventative Measures

The case of Paul Kostanich serves as a critical learning point. By accessing victim accounts using stolen credentials, he exploited security gaps within the app. In response, companies are increasingly adopting artificial intelligence to monitor unusual activity in real-time, providing an immediate alert system against fraudulent activities.

The Role of Legislation and Regulatory Environments

With the increasing frequency of digital fraud, governments are stepping up their game. Recent updates to the European Union’s General Data Protection Regulation (GDPR) emphasize stricter penalties for mishandling personal data, compelling companies to prioritize user security. For instance, in 2023, a luxury retailer faced a hefty fine for failing to secure customer data in Italy.

FAQ: Understanding Loyalty Program Security

  • What measures can I take to protect my loyalty program account?
    Enabling MFA and regularly updating passwords are foundational steps.
  • How can I report suspicious activity in my account?
    Contact the loyalty program’s customer support immediately for assistance.
  • Are my funds permanently lost if they are stolen through fraud?
    Contact the loyalty program support, as many have procedures in place for reimbursement.

Pro Tips: Staying Ahead of Fraudsters

Did you know? Regularly monitoring your loyalty point balance through app notifications can help identify unauthorized transactions quickly. Stay vigilant by subscribing to your favorite programs’ security updates.

Looking Ahead: Shaping a Secure Future

As tech evolves, so do the strategies to safeguard digital transactions. Blockchain technology is emerging as a promising solution to enhance transparency and trust within loyalty programs. Companies are also looking into integrating decentralized identity solutions, which can significantly reduce identity theft risks.

At the forefront of this innovation, enterprises are collaborating with cybersecurity firms to design algorithms that predict fraud before it happens.

For more insights into the future of digital finance security, explore our latest articles.

Call to Action: What steps do you take to protect your online accounts? Join the conversation below and share your thoughts. Don’t forget to subscribe to our newsletter for more expert insights. Stay secure and informed!

This article explores emerging trends in digital payment security, specifically within loyalty programs, providing insightful analysis that combines real-world examples, legislative context, and practical advice. It’s designed to engage readers and enrich their understanding, suitable for integration into a WordPress post.

March 29, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • Luis Roberto: What is the Neoplasia That Sidelines the Narrator?

    April 8, 2026
  • Redmi Note 15 Pro+ Price Drop: 200MP Camera & 6500mAh Battery Deal

    April 8, 2026
  • Study identifies a common brain activity pattern across psychedelics

    April 8, 2026
  • Cairo Harassment: Man Arrested After Viral Video

    April 8, 2026
  • Hélène Hendriks: KNVB Event Held in Former Sex Club

    April 8, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World