<!DOCTYPE html><html data-n-head-ssr="" lang="en-us" data-n-head="%7B%22lang%22:%7B%22ssr%22:%22en-us%22%7D%7D"><head><meta data-n-head="ssr" charset="utf-8"><meta data-n-head="ssr" name="viewport" content="width=device-width, initial-scale=1"><meta data-n-head="ssr" data-hid="description" name="description" content="News, views and insights from the Bitdefender experts"><meta data-n-head="ssr" data-hid="og:title" property="og:title" content="Consumer Insights"><meta data-n-head="ssr" data-hid="og:description" property="og:description" content="News, views and insights from the Bitdefender experts"><meta data-n-head="ssr" data-hid="og:url" property="og:url" content="https://www.bitdefender.com/en-us/blog/hotforsecurity/"><meta data-n-head="ssr" data-hid="og:image" property="og:image" content="https://download.bitdefender.com/resources/themes/draco/images/lite_v2/blog-images/image-hotforsecurity.jpg"><meta data-n-head="ssr" data-hid="og:type" property="og:type" content="website"><meta data-n-head="ssr" data-hid="og:site_name" property="og:site_name" content="Hot for Security"><meta data-n-head="ssr" data-hid="twitter:title" property="twitter:title" content="Consumer Insights"><meta data-n-head="ssr" data-hid="twitter:description" property="twitter:description" content="News, views and insights from the Bitdefender experts"><meta data-n-head="ssr" data-hid="twitter:url" property="twitter:url" content="https://www.bitdefender.com/en-us/blog/hotforsecurity/"><meta data-n-head="ssr" data-hid="twitter:image" property="twitter:image" content="https://download.bitdefender.com/resources/themes/draco/images/lite_v2/blog-images/image-hotforsecurity.jpg"><meta data-n-head="ssr" data-hid="author" name="author" content="Bitdefender"><meta data-n-head="ssr" data-hid="robots" name="robots" content="index,follow"><title>Consumer Insights</title><link data-n-head="ssr" rel="apple-touch-icon" sizes="57x57" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-57x57.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="114x114" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-114x114.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="72x72" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-72x72.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="144x144" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-144x144.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="60x60" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-60x60.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="120x120" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-120x120.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="76x76" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-76x76.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="152x152" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-152x152.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="196x196" href="https://download.bitdefender.com/resources/images/favicon/favicon-196x196.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="96x96" href="https://download.bitdefender.com/resources/images/favicon/favicon-96x96.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="32x32" href="https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="16x16" href="https://download.bitdefender.com/resources/images/favicon/favicon-16x16.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="canonical" rel="canonical" href="https://www.bitdefender.com/en-us/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="hreflang-en-US" rel="alternate" hreflang="en-US" href="https://www.bitdefender.com/en-us/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="hreflang-en-GB" rel="alternate" hreflang="en-GB" href="https://www.bitdefender.com/en-gb/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="hreflang-en-AU" rel="alternate" hreflang="en-AU" href="https://www.bitdefender.com/en-au/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link rel="stylesheet" href="/nuxt/_nuxt/css/6b42635.css" nonce="DhcnhD3khTMePgXW"><link rel="stylesheet" href="/nuxt/_nuxt/css/2bc6b32.css" nonce="DhcnhD3khTMePgXW"><link rel="stylesheet" href="/nuxt/_nuxt/css/7e582bf.css" nonce="DhcnhD3khTMePgXW"><script type="importmap" nonce="DhcnhD3khTMePgXW">{
      "imports": {
        "@repobit/dex-data-layer": "https://esm.sh/@repobit/dex-data-layer@1.6.1",
        "@repobit/dex-launch":     "https://esm.sh/@repobit/dex-launch@2.0.1",
        "@repobit/dex-target":     "https://esm.sh/@repobit/dex-target@2.2.0",
        "@repobit/dex-utils":      "https://esm.sh/@repobit/dex-utils@1.3.0",
        "@tsparticles/all":        "https://esm.sh/@tsparticles/all@3.8.1",
        "@tsparticles/engine":     "https://esm.sh/@tsparticles/engine@3.8.1"
      }
    }</script><script src="/nuxt/_nuxt/e65cf33.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/eb938ba.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/8e0803f.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/b5382a3.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/3203299.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/737124e.js" defer="" nonce="DhcnhD3khTMePgXW"></script></head><body><div data-server-rendered="true" id="__nuxt"><!----><div id="__layout"><div><header class="tw-bg-white tw-py-5 lg:tw-bg-black lg:tw-py-4 lg:tw-pt-0"><div class="tw-container tw-flex tw-justify-between lg:tw-hidden"><a href="/" aria-label="Bitdefender" title="Bitdefender" class="tw-block tw-w-[103px] sm:tw-w-[150px] md:tw-w-[180px]"><svg xmlns="http://www.w3.org/2000/svg" width="189.789" height="27.868" viewBox="0 0 189.789 27.868" class="tw-block tw-h-full tw-w-full"><path fill="black" d="M176.528 83.716a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.146 12.146 0 0 0 4.652-.865l2.477-4.146-.328-.192a14.073 14.073 0 0 1-6.407 1.694c-3 0-5.6-1.517-5.888-4.141h13.274v-1.2c0-6.067-3.678-9.485-8.536-9.485m-4.739 7.415a4.318 4.318 0 0 1 4.5-4.146c2.724 0 4.394 1.6 4.425 4.146zm95.177-7.4a8.718 8.718 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.086 12.086 0 0 0 4.642-.865l2.487-4.146-.328-.177a14.1 14.1 0 0 1-6.412 1.694c-3 0-5.59-1.517-5.883-4.141h13.264c.575-6.836-3.093-10.688-8.536-10.688m-4.737 7.417a4.314 4.314 0 0 1 4.49-4.146c2.724 0 4.394 1.6 4.43 4.146zm-56.1-7.417a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.126 12.126 0 0 0 4.652-.865l2.477-4.146-.333-.177a14.038 14.038 0 0 1-6.4 1.694c-3 0-5.6-1.517-5.888-4.141h13.279c.575-6.836-3.1-10.688-8.546-10.688m-4.732 7.417a4.318 4.318 0 0 1 4.5-4.146c2.719 0 4.394 1.6 4.425 4.146zM116.2 88.039v-.071a5.717 5.717 0 0 0 4.46-5.632c0-4.692-3.991-6.471-7.865-6.471H99.68v.384l1.32 1.122c1.584 1.294 1.786 1.542 1.786 2.71v21.528h9.258c4.853 0 9.722-1.744 9.722-7.346a6.128 6.128 0 0 0-5.55-6.219m-8.864-8.256h3.769c2.553 0 3.34.354 4.112 1.092a2.931 2.931 0 0 1 .858 2.22 2.885 2.885 0 0 1-.883 2.149c-.757.728-1.8 1.082-3.688 1.082h-4.167zm4.208 17.888h-4.208v-7.413h4.389c3.7 0 5.439.945 5.439 3.635 0 3.382-3.269 3.782-5.62 3.782m18.83-19.45a2.8 2.8 0 1 1-2.8-2.629 2.681 2.681 0 0 1 2.825 2.619m-7.336 5.936h6.695V101.6h-4.359V87.872c0-1.441-.081-1.673-1.645-2.882l-.691-.551zm34.65-9.06l1.367.88c1.241.794 1.428 1.173 1.428 2.28v8.089h-.106a7.158 7.158 0 0 0-5.913-2.654c-4.969 0-8.42 4-8.42 9.161s3.234 9.161 8.6 9.161a6.746 6.746 0 0 0 5.989-3.034h.071l.454 2.619h3.678V74.782h-7.147zm-2.174 23a5.234 5.234 0 1 1 5.121-5.233 5.059 5.059 0 0 1-5.121 5.233m92.473-23l.605.4c2.1 1.33 2.361 1.714 2.361 3.984v6.89h-.111a7.166 7.166 0 0 0-5.913-2.654c-4.969 0-8.415 4-8.415 9.161s3.229 9.161 8.577 9.161a6.734 6.734 0 0 0 5.989-3.034h.076l.459 2.619h3.678V74.782h-7.315zm-2.018 23a5.234 5.234 0 1 1 5.116-5.233 5.059 5.059 0 0 1-5.116 5.237m43.449-14.156v4.216a8.7 8.7 0 0 0-2.1-.329 4.391 4.391 0 0 0-4.682 4.4v9.343h-4.349V88.706c0-2.194-.116-2.528-1.887-3.645l-1.095-.723v-.192h7.341v2.771h.076a5.549 5.549 0 0 1 5.151-3.2 5.715 5.715 0 0 1 1.559.253m-96.673.11h4.036v3.72H192.8v13.8h-4.369V89.3c0-1.461-.293-1.785-2.018-3.155l-2.22-1.81v-.255h4.243V80.9c0-4.737 3.083-7.746 9.752-6.411l1.009 3.7-.212.172c-3.486-1.375-6.185-.506-6.185 2.528zm41.239 6.5v11.02h-4.354v-9.709c0-1.921-.5-4.247-3.532-4.247-2.866 0-3.991 2.108-3.991 4.434v9.522h-4.349V88.7c0-2.194-.116-2.528-1.887-3.645l-1.059-.723v-.192h7.114v2.66h.071a6.742 6.742 0 0 1 5.55-3.094c4.112 0 6.483 2.821 6.483 6.866m-89.345 7.523l.141.091s-2.164 3.468-2.159 3.468c-3.532.966-7.537-.061-7.537-5.764v-7.078c0-1.127-.182-1.067-2.623-3.084l-1.579-1.37v-.207h4.228L136.8 79.1h2.76v5.056h4.657v3.7h-4.657v7.912c0 3.15 2.154 3.226 5.186 2.326" transform="translate(-99.68 -74.171)"></path></svg></a> <button aria-label="Toggle menu" class="tw-block"><span class="tw-block tw-h-[3px] tw-w-[25px] tw-bg-black data-[menu-active=true]:tw-translate-y-[8px] data-[menu-active=true]:-tw-rotate-45"></span> <span class="tw-my-[5px] tw-block tw-h-[3px] tw-w-[25px] tw-bg-black data-[menu-active=true]:tw-invisible"></span> <span class="tw-block tw-h-[3px] tw-w-[25px] tw-bg-black data-[menu-active=true]:-tw-translate-y-[8px] data-[menu-active=true]:tw-rotate-45"></span></button></div> <div class="tw-hidden tw-flex-wrap data-[menu-active=true]:tw-flex lg:tw-block lg:data-[menu-active=true]:tw-block"><div class="tw-order-last tw-w-full tw-border-[#3c3c3c] lg:tw-border-b-2"><div class="tw-container"><ul class="tw-block tw-justify-end lg:tw-flex"><li class="tw-relative"><a aria-label="Company" title="Company" href="/en-us/company/" data-link="/en-us/company/" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:-tw-left-4 before:tw-m-auto before:tw-hidden before:tw-h-4 before:tw-w-0.5 before:tw-bg-[#616161] after:tw-absolute after:tw-bottom-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-mx-4 lg:tw-border-0 lg:tw-py-3 lg:tw-text-xs lg:tw-uppercase lg:tw-tracking-widest lg:tw-text-[#dedede] lg:before:tw-block lg:hover:after:tw-scale-x-100">Company
                  </a> <!----></li><li class="tw-relative"><a aria-label="Blog" title="Blog" href="/en-us/blog/" data-link="/en-us/blog/" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:-tw-left-4 before:tw-m-auto before:tw-hidden before:tw-h-4 before:tw-w-0.5 before:tw-bg-[#616161] after:tw-absolute after:tw-bottom-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-mx-4 lg:tw-border-0 lg:tw-py-3 lg:tw-text-xs lg:tw-uppercase lg:tw-tracking-widest lg:tw-text-[#dedede] lg:before:tw-block lg:hover:after:tw-scale-x-100">Blog
                  </a> <!----></li></ul></div></div> <div class="tw-container tw-mt-5 lg:tw-mt-3.5 lg:tw-flex xl:tw-mt-5"><a href="/" aria-label="Bitdefender" title="Bitdefender" class="tw-mr-3 tw-hidden tw-h-[30px] tw-w-[180px] lg:tw-block"><svg xmlns="http://www.w3.org/2000/svg" width="189.789" height="27.868" viewBox="0 0 189.789 27.868" class="tw-block tw-h-full tw-w-full"><path fill="#fff" d="M176.528 83.716a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.146 12.146 0 0 0 4.652-.865l2.477-4.146-.328-.192a14.073 14.073 0 0 1-6.407 1.694c-3 0-5.6-1.517-5.888-4.141h13.274v-1.2c0-6.067-3.678-9.485-8.536-9.485m-4.739 7.415a4.318 4.318 0 0 1 4.5-4.146c2.724 0 4.394 1.6 4.425 4.146zm95.177-7.4a8.718 8.718 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.086 12.086 0 0 0 4.642-.865l2.487-4.146-.328-.177a14.1 14.1 0 0 1-6.412 1.694c-3 0-5.59-1.517-5.883-4.141h13.264c.575-6.836-3.093-10.688-8.536-10.688m-4.737 7.417a4.314 4.314 0 0 1 4.49-4.146c2.724 0 4.394 1.6 4.43 4.146zm-56.1-7.417a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.126 12.126 0 0 0 4.652-.865l2.477-4.146-.333-.177a14.038 14.038 0 0 1-6.4 1.694c-3 0-5.6-1.517-5.888-4.141h13.279c.575-6.836-3.1-10.688-8.546-10.688m-4.732 7.417a4.318 4.318 0 0 1 4.5-4.146c2.719 0 4.394 1.6 4.425 4.146zM116.2 88.039v-.071a5.717 5.717 0 0 0 4.46-5.632c0-4.692-3.991-6.471-7.865-6.471H99.68v.384l1.32 1.122c1.584 1.294 1.786 1.542 1.786 2.71v21.528h9.258c4.853 0 9.722-1.744 9.722-7.346a6.128 6.128 0 0 0-5.55-6.219m-8.864-8.256h3.769c2.553 0 3.34.354 4.112 1.092a2.931 2.931 0 0 1 .858 2.22 2.885 2.885 0 0 1-.883 2.149c-.757.728-1.8 1.082-3.688 1.082h-4.167zm4.208 17.888h-4.208v-7.413h4.389c3.7 0 5.439.945 5.439 3.635 0 3.382-3.269 3.782-5.62 3.782m18.83-19.45a2.8 2.8 0 1 1-2.8-2.629 2.681 2.681 0 0 1 2.825 2.619m-7.336 5.936h6.695V101.6h-4.359V87.872c0-1.441-.081-1.673-1.645-2.882l-.691-.551zm34.65-9.06l1.367.88c1.241.794 1.428 1.173 1.428 2.28v8.089h-.106a7.158 7.158 0 0 0-5.913-2.654c-4.969 0-8.42 4-8.42 9.161s3.234 9.161 8.6 9.161a6.746 6.746 0 0 0 5.989-3.034h.071l.454 2.619h3.678V74.782h-7.147zm-2.174 23a5.234 5.234 0 1 1 5.121-5.233 5.059 5.059 0 0 1-5.121 5.233m92.473-23l.605.4c2.1 1.33 2.361 1.714 2.361 3.984v6.89h-.111a7.166 7.166 0 0 0-5.913-2.654c-4.969 0-8.415 4-8.415 9.161s3.229 9.161 8.577 9.161a6.734 6.734 0 0 0 5.989-3.034h.076l.459 2.619h3.678V74.782h-7.315zm-2.018 23a5.234 5.234 0 1 1 5.116-5.233 5.059 5.059 0 0 1-5.116 5.237m43.449-14.156v4.216a8.7 8.7 0 0 0-2.1-.329 4.391 4.391 0 0 0-4.682 4.4v9.343h-4.349V88.706c0-2.194-.116-2.528-1.887-3.645l-1.095-.723v-.192h7.341v2.771h.076a5.549 5.549 0 0 1 5.151-3.2 5.715 5.715 0 0 1 1.559.253m-96.673.11h4.036v3.72H192.8v13.8h-4.369V89.3c0-1.461-.293-1.785-2.018-3.155l-2.22-1.81v-.255h4.243V80.9c0-4.737 3.083-7.746 9.752-6.411l1.009 3.7-.212.172c-3.486-1.375-6.185-.506-6.185 2.528zm41.239 6.5v11.02h-4.354v-9.709c0-1.921-.5-4.247-3.532-4.247-2.866 0-3.991 2.108-3.991 4.434v9.522h-4.349V88.7c0-2.194-.116-2.528-1.887-3.645l-1.059-.723v-.192h7.114v2.66h.071a6.742 6.742 0 0 1 5.55-3.094c4.112 0 6.483 2.821 6.483 6.866m-89.345 7.523l.141.091s-2.164 3.468-2.159 3.468c-3.532.966-7.537-.061-7.537-5.764v-7.078c0-1.127-.182-1.067-2.623-3.084l-1.579-1.37v-.207h4.228L136.8 79.1h2.76v5.056h4.657v3.7h-4.657v7.912c0 3.15 2.154 3.226 5.186 2.326" transform="translate(-99.68 -74.171)"></path></svg></a> <a href="/en-us/consumer/" onclick="s_objectID='For Home';" aria-label="For Home" title="For Home" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium after:tw-absolute after:tw-bottom-0 after:tw-left-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-border-0 lg:tw-px-5 lg:tw-pt-2 lg:tw-pb-4 lg:tw-text-[#dedede] lg:hover:after:tw-scale-x-100">For Home</a><a href="/en-us/business/" onclick="s_objectID='For Business';" aria-label="For Business" title="For Business" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium after:tw-absolute after:tw-bottom-0 after:tw-left-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-border-0 lg:tw-px-5 lg:tw-pt-2 lg:tw-pb-4 lg:tw-text-[#dedede] lg:hover:after:tw-scale-x-100">For Business</a><a href="/en-us/partners/" onclick="s_objectID='For Partners';" aria-label="For Partners" title="For Partners" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium after:tw-absolute after:tw-bottom-0 after:tw-left-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-border-0 lg:tw-px-5 lg:tw-pt-2 lg:tw-pb-4 lg:tw-text-[#dedede] lg:hover:after:tw-scale-x-100">For Partners</a></div></div></header> <div><nav data-fetch-key="BlogMenu:0" class="tw-bg-black tw-py-4"><div class="tw-container tw-flex tw-space-x-7"><div class="tw-flex tw-w-6/12 tw-items-center sm:tw-w-8/12"><a href="/en-us/blog/hotforsecurity/" aria-current="page" title="Consumer Insights" class="tw-relative tw-mr-4 tw-text-center tw-text-xs tw-font-bold tw-uppercase tw-text-[#7e8b9f] after:tw-absolute after:tw-left-0 after:tw--bottom-2 after:tw-block after:tw-h-[1px] after:tw-w-0 after:tw-bg-[#7e8b9f] after:tw-transition-all after:tw-duration-300 after:tw-ease-in-out hover:after:tw-w-full sm:tw-text-left md:tw-text-sm router-link-exact-active router-link-active">Consumer Insights
            </a><a href="/en-us/blog/labs/" title="Labs" class="tw-relative tw-mr-4 tw-text-center tw-text-xs tw-font-bold tw-uppercase tw-text-[#7e8b9f] after:tw-absolute after:tw-left-0 after:tw--bottom-2 after:tw-block after:tw-h-[1px] after:tw-w-0 after:tw-bg-[#7e8b9f] after:tw-transition-all after:tw-duration-300 after:tw-ease-in-out hover:after:tw-w-full sm:tw-text-left md:tw-text-sm">Labs
            </a><a href="/en-us/blog/businessinsights/" title="Business Insights" class="tw-relative tw-mr-4 tw-text-center tw-text-xs tw-font-bold tw-uppercase tw-text-[#7e8b9f] after:tw-absolute after:tw-left-0 after:tw--bottom-2 after:tw-block after:tw-h-[1px] after:tw-w-0 after:tw-bg-[#7e8b9f] after:tw-transition-all after:tw-duration-300 after:tw-ease-in-out hover:after:tw-w-full sm:tw-text-left md:tw-text-sm">Business Insights
            </a><!----></div> <div class="tw-flex tw-w-6/12 tw-items-center tw-justify-end sm:tw-w-4/12"><a aria-label="show rss feed" title="show rss feed" href="/nuxt/api/en-us/rss/hotforsecurity/" target="_blank" class="tw-w-5 tw-text-white tw-mr-4"><svg width="20" aria-hidden="true" focusable="false" data-prefix="far" data-icon="rss-square" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512" class="svg-inline--fa fa-rss-square fa-w-14"><path fill="currentColor" d="M400 32H48C21.49 32 0 53.49 0 80v352c0 26.51 21.49 48 48 48h352c26.51 0 48-21.49 48-48V80c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V86a6 6 0 0 1 6-6h340a6 6 0 0 1 6 6v340a6 6 0 0 1-6 6zm-218-88c0 22.091-17.909 40-40 40s-40-17.909-40-40 17.909-40 40-40 40 17.909 40 40zm93.566 30.405c-4.774-88.343-75.534-159.193-163.971-163.971-5.22-.282-9.595 3.912-9.595 9.14v27.468c0 4.808 3.709 8.841 8.507 9.153 63.904 4.162 115.127 55.258 119.298 119.298.313 4.798 4.345 8.507 9.153 8.507h27.468c5.228 0 9.422-4.375 9.14-9.595zm82.428.165c-4.796-133.612-112.3-241.744-246.564-246.564-5.159-.185-9.43 3.983-9.43 9.146v27.467c0 4.929 3.906 8.94 8.83 9.142 109.245 4.479 196.93 92.181 201.408 201.408.202 4.925 4.213 8.83 9.142 8.83h27.467c5.164.001 9.332-4.27 9.147-9.429z"></path></svg></a> <button aria-label="Open bookmarks list" class="tw-relative tw-text-xl tw-mr-4"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----> <!----></button> <button aria-label="open search bar" class="tw-text-white tw-block tw-text-2xl"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58.1 59.4" width="22" overflow="visible" class="tw-w-[1em] tw-h-[1em] icon-search"><circle cx="23" cy="23" r="20.5" class="icon-search-inner"></circle> <path d="M39.5 35.2l16.1 11.7" class="icon-search-inner"></path></svg></button> <!----></div></div></nav> <div></div> <header class="header tw-relative tw-bg-black tw-bg-cover tw-bg-center tw-py-12 after:tw-absolute after:tw-left-0 after:tw-top-0 after:tw-z-10 after:tw-block after:tw-h-full after:tw-w-full after:tw-bg-gradient-to-r after:tw-from-black after:tw-via-black/[0.8] after:tw-to-black/0 after:tw-opacity-90 lg:after:tw-w-3/4 xl:tw-pt-0" style="--bg-image-xl:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w2000/2026/05/Instagram-impersonation-scams.jpg');--bg-image-l:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w1000/2026/05/Instagram-impersonation-scams.jpg');--bg-image-m:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instagram-impersonation-scams.jpg');--bg-image-s:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/Instagram-impersonation-scams.jpg');" data-v-0e4cfc3c=""><div class="tw-container tw-relative tw-z-20 tw-text-white xl:tw-py-12" data-v-0e4cfc3c=""><div class="tw-my-6 tw-w-full md:tw-w-10/12 lg:tw-w-7/12" data-v-0e4cfc3c=""><!----> <h1 class="tw-mb-4 tw-text-xl tw-font-bold" data-v-0e4cfc3c="">Consumer Insights</h1> <div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/instagram-impersonation-scams" title="Instagram impersonation scams: Fake brands, businesses and support accounts" class="tw-block" data-v-0e4cfc3c=""><h2 class="md:tYeahw-text-3xl tw-text-2xl tw-font-bold md:tw-leading-snug lg:tw-text-4xl lg:tw-leading-snug xl:tw-text-5xl xl:tw-leading-tight" data-v-0e4cfc3c="">
               Instagram impersonation scams: Fake brands, businesses and support accounts
            </h2></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Vlad CONSTANTINESCU" title="Vlad CONSTANTINESCU" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2021/12/Vlad.jpg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Vlad CONSTANTINESCU
         </a></div> <p style="color:#41485e;">
         May 19, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             7 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div> <h3 class="tw-relative tw-mt-12 tw-mb-6 tw-inline-block tw-pr-6 tw-text-lg tw-text-[#41485e] after:tw-absolute after:tw--right-24 after:tw-top-0 after:tw-bottom-0 after:tw-m-auto after:tw-block after:tw-h-2.5 after:tw-w-24 after:tw-bg-current" data-v-0e4cfc3c="">Top Stories</h3> <div class="tw-mb-4 last:tw-mb-0" data-v-0e4cfc3c=""><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-block tw-text-lg tw-font-bold" data-v-0e4cfc3c="">Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region</a></div><div class="tw-mb-4 last:tw-mb-0" data-v-0e4cfc3c=""><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/football-ticket-scams-lloyds-bank" title="Football ticket scams are rising fast, Lloyds Bank warns" class="tw-block tw-text-lg tw-font-bold" data-v-0e4cfc3c="">Football ticket scams are rising fast, Lloyds Bank warns</a></div><div class="tw-mb-4 last:tw-mb-0" data-v-0e4cfc3c=""><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/mobile-security" title="Mobile Security" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Mobile Security
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/iphone-to-android-texts-encrypted-e2ee" title="iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You" class="tw-block tw-text-lg tw-font-bold" data-v-0e4cfc3c="">iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You</a></div></div></div></header> <section class="tw-overflow-hidden tw-bg-[#eff0f1] tw-py-12"><div class="tw-container tw-mb-6 tw-flex tw-w-full tw-flex-wrap"><div class="tw-w-1/2"><h2><span class="tw-block tw-text-sm tw-font-medium tw-uppercase lg:tw-text-sm" style="color:#696969;">
      latest
   </span> <span class="tw-block tw-text-xl tw-font-bold tw-uppercase lg:tw-text-2xl tw-text-black">
      Industry News
   </span></h2></div> <div class="tw-w-1/2 tw-text-right"><a href="/en-us/blog/hotforsecurity/tag/industry-news" class="tw-inline-block tw-cursor-pointer tw-border tw-border-[#d4d7d9] tw-bg-white tw-p-4 tw-text-sm tw-font-bold tw-text-[#265fc9] hover:tw-bg-[#d4d7d9] sm:tw-py-4 sm:tw-px-10">View all posts</a></div></div> <div class="tw-container md:tw-flex md:tw-space-x-7"><div class="tw-mb-4 tw-w-full md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block"><a href="/en-us/blog/hotforsecurity/crypto-atm-scams-americans-lose-millions-fbi" title="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" title="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/crypto-atm.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#0065EB;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/crypto-atm-scams-americans-lose-millions-fbi" title="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#6B6B6B;">
         May 20, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             4 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div class="tw-mb-4 tw-w-full md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block"><a href="/en-us/blog/hotforsecurity/fbi-shinyhunters-canvas-breach" title="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" title="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/canvas-fbi.jpeg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#0065EB;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/fbi-shinyhunters-canvas-breach" title="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>FBI warns students and staff that ShinyHunters may come knocking after Canvas breach</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Graham CLULEY" title="Graham CLULEY" data-src="https://2.gravatar.com/avatar/5fdc27b8b6f6fd69e77aa017a53cceb5?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Graham CLULEY
         </a></div> <p style="color:#6B6B6B;">
         May 20, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div class="tw-mb-4 tw-w-full md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block"><a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/scam-center.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#0065EB;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#6B6B6B;">
         May 19, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             5 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div></div></section> <section class="tw-overflow-hidden tw-bg-[#111] tw-py-12"><div class="tw-container"><div class="tw-mb-6 tw-flex tw-w-1/2 tw-items-center"><h2><span class="tw-block tw-text-sm tw-font-medium tw-uppercase lg:tw-text-sm" style="color:#969696;">
      latest
   </span> <span class="tw-block tw-text-xl tw-font-bold tw-uppercase lg:tw-text-2xl tw-text-white">
      Digital Privacy
   </span></h2></div> <div class="tw-flex-wrap tw-gap-7 md:tw-inline-flex"><div class="tw-mb-8 tw-w-full"><div class="tw-relative tw-h-[360px] tw-p-6 md:tw-h-[460px] lg:tw-h-[600px] lg:tw-p-12"><div class="tw-relative tw-z-20 tw-flex tw-h-full tw-flex-col tw-flex-wrap tw-justify-between"><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm tw-text-white"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Vlad CONSTANTINESCU" title="Vlad CONSTANTINESCU" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2021/12/Vlad.jpg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Vlad CONSTANTINESCU
         </a></div> <p style="color:#757575;">
         May 19, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             7 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div> <div><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/instagram-impersonation-scams" title="Instagram impersonation scams: Fake brands, businesses and support accounts" class="tw-bold tw-max-w-md tw-overflow-hidden tw-text-2xl tw-font-bold tw-text-white tw-line-clamp-3 md:tw-text-3xl md:tw-leading-tight">Instagram impersonation scams: Fake brands, businesses and support accounts</a></div></div> <div class="tw-absolute tw-left-0 tw-top-0 tw-h-full tw-w-full after:tw-absolute after:tw-left-0 after:tw-bottom-0 after:tw-z-10 after:tw-block after:tw-h-1/2 after:tw-w-full after:tw-bg-gradient-to-t after:tw-from-[#111]/[1] after:tw-via-[#111]/[0.8] after:tw-to-[#111]/[0]"><img width="500" height="500" alt="Instagram impersonation scams: Fake brands, businesses and support accounts" title="Instagram impersonation scams: Fake brands, businesses and support accounts" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instagram-impersonation-scams.jpg" class="tw-h-full tw-w-full tw-object-cover"></div></div></div> <!----><!----> <div class="tw-mb-4 tw-w-full tw-flex-1 last:tw-mb-0 md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-text-white"><a href="/en-us/blog/hotforsecurity/instagram-paid-follower-scam" title="Instagram paid follower scams can cost you more than your money" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Instagram paid follower scams can cost you more than your money" title="Instagram paid follower scams can cost you more than your money" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instagram-paid-follower---fake-engagement-scams.jpg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#1479FF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/instagram-paid-follower-scam" title="Instagram paid follower scams can cost you more than your money" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Instagram paid follower scams can cost you more than your money</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Vlad CONSTANTINESCU" title="Vlad CONSTANTINESCU" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2021/12/Vlad.jpg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Vlad CONSTANTINESCU
         </a></div> <p style="color:#808080;">
         May 12, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             7 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><!----> <div class="tw-mb-4 tw-w-full tw-flex-1 last:tw-mb-0 md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-text-white"><a href="/en-us/blog/hotforsecurity/instagram-drops-encrypted-dms" title="Instagram Drops Encrypted DMs — What This Means for You" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Instagram Drops Encrypted DMs — What This Means for You" title="Instagram Drops Encrypted DMs — What This Means for You" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/instagram-dm-encryption.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#1479FF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/instagram-drops-encrypted-dms" title="Instagram Drops Encrypted DMs — What This Means for You" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Instagram Drops Encrypted DMs — What This Means for You</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#808080;">
         May 11, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><!----> <div class="tw-mb-4 tw-w-full tw-flex-1 last:tw-mb-0 md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-text-white"><a href="/en-us/blog/hotforsecurity/canvas-data-breach-2026" title="Instructure confirms breach; millions of Canvas users potentially impacted" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Instructure confirms breach; millions of Canvas users potentially impacted" title="Instructure confirms breach; millions of Canvas users potentially impacted" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instructure-confirms-breach--millions-of-Canvas-users-potentially-impacted.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#1479FF;"><a href="/en-us/blog/hotforsecurity/tag/data-breach" title="Data Breach" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Data Breach
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/canvas-data-breach-2026" title="Instructure confirms breach; millions of Canvas users potentially impacted" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Instructure confirms breach; millions of Canvas users potentially impacted</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#808080;">
         May 05, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             2 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div></div></div></section> <section data-fetch-key="FilterSection:0" class="tw-container tw-flex tw-flex-wrap tw-py-8 lg:tw-flex-nowrap lg:tw-space-x-7"><div class="tw-order-last tw-mb-12 tw-w-full md:tw-mb-0 lg:tw-order-first lg:tw-w-2/3"><div class="tw-mb-7 tw-flex tw-h-20 tw-items-center tw-border-b tw-border-[#e1e3e5] tw-text-xs tw-font-bold sm:tw-text-sm md:tw-text-base"><h2 data-button-active="true" class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               All
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Threats
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Product Updates
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Smart Home
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Tips and Tricks
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               VPN
            </h2></div> <div class="tw-grid-cols-2 tw-gap-7 md:tw-grid"><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/crypto-atm-scams-americans-lose-millions-fbi" title="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" title="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/crypto-atm.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/crypto-atm-scams-americans-lose-millions-fbi" title="Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#757575;">
         May 20, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             4 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/amazon-recall-scams" title="Amazon recall scams are on the rise. Here’s how to stay safe." class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Amazon recall scams are on the rise. Here’s how to stay safe." title="Amazon recall scams are on the rise. Here’s how to stay safe." data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/amazon-recall-scams.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/amazon-recall-scams" title="Amazon recall scams are on the rise. Here’s how to stay safe." class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Amazon recall scams are on the rise. Here’s how to stay safe.</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#757575;">
         May 20, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             4 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/fbi-shinyhunters-canvas-breach" title="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" title="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/canvas-fbi.jpeg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/fbi-shinyhunters-canvas-breach" title="FBI warns students and staff that ShinyHunters may come knocking after Canvas breach" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>FBI warns students and staff that ShinyHunters may come knocking after Canvas breach</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Graham CLULEY" title="Graham CLULEY" data-src="https://2.gravatar.com/avatar/5fdc27b8b6f6fd69e77aa017a53cceb5?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Graham CLULEY
         </a></div> <p style="color:#757575;">
         May 20, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/scam-center.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#757575;">
         May 19, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             5 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/instagram-impersonation-scams" title="Instagram impersonation scams: Fake brands, businesses and support accounts" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Instagram impersonation scams: Fake brands, businesses and support accounts" title="Instagram impersonation scams: Fake brands, businesses and support accounts" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instagram-impersonation-scams.jpg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/instagram-impersonation-scams" title="Instagram impersonation scams: Fake brands, businesses and support accounts" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Instagram impersonation scams: Fake brands, businesses and support accounts</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Vlad CONSTANTINESCU" title="Vlad CONSTANTINESCU" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2021/12/Vlad.jpg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/vlad" title="Vlad CONSTANTINESCU" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Vlad CONSTANTINESCU
         </a></div> <p style="color:#757575;">
         May 19, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             7 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/older-adults-lost-billions-to-scammers-2026" title="Older adults lost billions to scammers last year, FBI warns" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Older adults lost billions to scammers last year, FBI warns" title="Older adults lost billions to scammers last year, FBI warns" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Older-adults-lost-billions-to-scammers-last-year--FBI-warns.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/older-adults-lost-billions-to-scammers-2026" title="Older adults lost billions to scammers last year, FBI warns" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Older adults lost billions to scammers last year, FBI warns</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#757575;">
         May 19, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div></div> <div class="tw-mb-12 tw-mt-16"><button class="tw-rounded-lg tw-mx-auto tw-block tw-w-full tw-max-w-[260px] tw-cursor-pointer tw-bg-[#006dff] tw-px-10 tw-py-4 tw-text-sm tw-font-bold tw-text-white hover:tw-bg-[#0059d6] disabled:tw-pointer-events-none disabled:tw-opacity-50 focus:tw-bg-[#0045ad] focus-visible:tw-outline-2 focus-visible:tw-outline-offset-2 focus-visible:tw-outline-solid">
            Load more
         </button></div></div> <div class="tw-w-full lg:tw-w-1/3"><!----> <h2 class="tw-mb-7 tw-h-20 tw-border-b tw-border-[#e1e3e5]"><span class="tw-block tw-text-sm tw-font-medium tw-uppercase lg:tw-text-sm" style="color:#696969;">
      Right now
   </span> <span class="tw-block tw-text-xl tw-font-bold tw-uppercase lg:tw-text-2xl tw-text-black">
      Top posts
   </span></h2> <div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-block tw-h-full"><img width="200" height="200" alt="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/scam-center.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/scam-center-interpol-arrests-mena" title="Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         May 19, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/football-ticket-scams-lloyds-bank" title="Football ticket scams are rising fast, Lloyds Bank warns" class="tw-block tw-h-full"><img width="200" height="200" alt="Football ticket scams are rising fast, Lloyds Bank warns" title="Football ticket scams are rising fast, Lloyds Bank warns" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/Football-ticket-scams-are-rising-fast--Lloyds-Bank-warns.jpg" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/football-ticket-scams-lloyds-bank" title="Football ticket scams are rising fast, Lloyds Bank warns" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               Football ticket scams are rising fast, Lloyds Bank warns
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         May 14, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/iphone-to-android-texts-encrypted-e2ee" title="iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You" class="tw-block tw-h-full"><img width="200" height="200" alt="iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You" title="iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/iPhone-to-Android-Texts-Are-E2EE-Encrypted--header-.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/mobile-security" title="Mobile Security" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Mobile Security
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/iphone-to-android-texts-encrypted-e2ee" title="iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         May 13, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/clickfix-victims-help-hackers" title="ClickFix: When the victims help the hackers" class="tw-block tw-h-full"><img width="200" height="200" alt="ClickFix: When the victims help the hackers" title="ClickFix: When the victims help the hackers" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/ChatGPT-Image-May-11--2026--09_21_54-PM.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/threats" title="Threats" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Threats
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/clickfix-victims-help-hackers" title="ClickFix: When the victims help the hackers" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               ClickFix: When the victims help the hackers
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         May 11, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/clickfix-compromised-wordpress-sites-vidar-stealer-australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" class="tw-block tw-h-full"><img width="200" height="200" alt="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/clickfix-vidar-stealer-australia-header.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/very-small-business" title="Very Small Business" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Very Small Business
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/clickfix-compromised-wordpress-sites-vidar-stealer-australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         May 08, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/set-up-parent-managed-whatsapp-account-child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" class="tw-block tw-h-full"><img width="200" height="200" alt="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/03/whatsap-kids-child-manage-account.jpg" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/family" title="Family Safety" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Family Safety
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/set-up-parent-managed-whatsapp-account-child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         March 12, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></section> <!----> <div class="tw-fixed tw-top-0 tw-right-0 tw-z-[9999] tw-h-full tw-w-full tw-max-w-[450px] tw-translate-x-[450px] tw-bg-white tw-p-6 tw-transition-transform data-[bookmark-active=true]:tw-translate-x-0"><div class="tw-relative tw-mb-4"><h4 class="tw-text-sm tw-font-bold tw-uppercase tw-text-[#595959]">Bookmarks</h4> <button aria-label="Close bookmarks list" class="tw-absolute tw-right-0 tw-top-0 tw-bottom-0 tw-m-auto tw-flex tw-h-7 tw-w-7 tw-items-center tw-justify-center tw-text-2xl tw-text-[#595959] tw-opacity-50 hover:tw-opacity-100"><svg aria-hidden="true" focusable="false" role="img" width="24" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512" class="tw-w-[1em] tw-h-[1em]"><path fill="currentColor" d="M207.6 256l107.72-107.72c6.23-6.23 6.23-16.34 0-22.58l-25.03-25.03c-6.23-6.23-16.34-6.23-22.58 0L160 208.4 52.28 100.68c-6.23-6.23-16.34-6.23-22.58 0L4.68 125.7c-6.23 6.23-6.23 16.34 0 22.58L112.4 256 4.68 363.72c-6.23 6.23-6.23 16.34 0 22.58l25.03 25.03c6.23 6.23 16.34 6.23 22.58 0L160 303.6l107.72 107.72c6.23 6.23 16.34 6.23 22.58 0l25.03-25.03c6.23-6.23 6.23-16.34 0-22.58L207.6 256z"></path></svg></button></div> <div class="tw-h-full tw-overflow-y-auto"><hr class="tw-mb-4"> <!----> </div></div> <div class="tw-fixed tw-top-1/3 tw-right-0 tw-left-0 tw-z-[9999] tw-m-auto tw-hidden tw-h-12 tw-w-11/12 tw-max-w-3xl tw-overflow-hidden tw-rounded-lg tw-border tw-border-[#595959] tw-bg-[#343a40] tw-text-white data-[search-show=true]:tw-block data-[search-active=true]:tw-h-96"><div class="tw-relative"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58.1 59.4" width="22" overflow="visible" class="tw-w-[1em] tw-h-[1em] icon-search tw-absolute tw-left-3 tw-top-3 tw-text-2xl tw-opacity-50"><circle cx="23" cy="23" r="20.5" class="icon-search-inner"></circle> <path d="M39.5 35.2l16.1 11.7" class="icon-search-inner"></path></svg> <input placeholder="What are you looking for?" class="tw-block tw-h-12 tw-w-full tw-border-0 tw-bg-transparent tw-py-2.5 tw-pl-12 tw-pr-2.5 tw-text-2xl tw-text-white"> <div class="tw-my-2 tw-h-80 tw-overflow-y-auto"><img data-src="https://download.bitdefender.com/resources/themes/draco/images/lite_v2/blog-images/loader-white.svg" alt="loader" title="loader" class="tw-mx-auto tw-block tw-h-14 tw-w-32 tw-object-cover"> <!----> </div></div></div> <footer class="tw-bg-[#111] tw-py-12"><div class="tw-container tw-items-center tw-text-center tw-flex-col lg:tw-text-left"><div class="tw-flex tw-flex-col lg:tw-flex-row lg:tw-justify-between tw-items-center lg:tw-items-end tw-pb-3 tw-mb-4 tw-border-b tw-border-solid tw-border-white"><a title="Bitdefender" aria-label="Bitdefender" href="/" class="tw-block tw-w-[150px] tw-pb-3 lg:tw-pb-0"><svg xmlns="http://www.w3.org/2000/svg" width="189.789" height="27.868" viewBox="0 0 189.789 27.868" class="tw-block tw-w-full"><path fill="#fff" d="M176.528 83.716a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.146 12.146 0 0 0 4.652-.865l2.477-4.146-.328-.192a14.073 14.073 0 0 1-6.407 1.694c-3 0-5.6-1.517-5.888-4.141h13.274v-1.2c0-6.067-3.678-9.485-8.536-9.485m-4.739 7.415a4.318 4.318 0 0 1 4.5-4.146c2.724 0 4.394 1.6 4.425 4.146zm95.177-7.4a8.718 8.718 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.086 12.086 0 0 0 4.642-.865l2.487-4.146-.328-.177a14.1 14.1 0 0 1-6.412 1.694c-3 0-5.59-1.517-5.883-4.141h13.264c.575-6.836-3.093-10.688-8.536-10.688m-4.737 7.417a4.314 4.314 0 0 1 4.49-4.146c2.724 0 4.394 1.6 4.43 4.146zm-56.1-7.417a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.126 12.126 0 0 0 4.652-.865l2.477-4.146-.333-.177a14.038 14.038 0 0 1-6.4 1.694c-3 0-5.6-1.517-5.888-4.141h13.279c.575-6.836-3.1-10.688-8.546-10.688m-4.732 7.417a4.318 4.318 0 0 1 4.5-4.146c2.719 0 4.394 1.6 4.425 4.146zM116.2 88.039v-.071a5.717 5.717 0 0 0 4.46-5.632c0-4.692-3.991-6.471-7.865-6.471H99.68v.384l1.32 1.122c1.584 1.294 1.786 1.542 1.786 2.71v21.528h9.258c4.853 0 9.722-1.744 9.722-7.346a6.128 6.128 0 0 0-5.55-6.219m-8.864-8.256h3.769c2.553 0 3.34.354 4.112 1.092a2.931 2.931 0 0 1 .858 2.22 2.885 2.885 0 0 1-.883 2.149c-.757.728-1.8 1.082-3.688 1.082h-4.167zm4.208 17.888h-4.208v-7.413h4.389c3.7 0 5.439.945 5.439 3.635 0 3.382-3.269 3.782-5.62 3.782m18.83-19.45a2.8 2.8 0 1 1-2.8-2.629 2.681 2.681 0 0 1 2.825 2.619m-7.336 5.936h6.695V101.6h-4.359V87.872c0-1.441-.081-1.673-1.645-2.882l-.691-.551zm34.65-9.06l1.367.88c1.241.794 1.428 1.173 1.428 2.28v8.089h-.106a7.158 7.158 0 0 0-5.913-2.654c-4.969 0-8.42 4-8.42 9.161s3.234 9.161 8.6 9.161a6.746 6.746 0 0 0 5.989-3.034h.071l.454 2.619h3.678V74.782h-7.147zm-2.174 23a5.234 5.234 0 1 1 5.121-5.233 5.059 5.059 0 0 1-5.121 5.233m92.473-23l.605.4c2.1 1.33 2.361 1.714 2.361 3.984v6.89h-.111a7.166 7.166 0 0 0-5.913-2.654c-4.969 0-8.415 4-8.415 9.161s3.229 9.161 8.577 9.161a6.734 6.734 0 0 0 5.989-3.034h.076l.459 2.619h3.678V74.782h-7.315zm-2.018 23a5.234 5.234 0 1 1 5.116-5.233 5.059 5.059 0 0 1-5.116 5.237m43.449-14.156v4.216a8.7 8.7 0 0 0-2.1-.329 4.391 4.391 0 0 0-4.682 4.4v9.343h-4.349V88.706c0-2.194-.116-2.528-1.887-3.645l-1.095-.723v-.192h7.341v2.771h.076a5.549 5.549 0 0 1 5.151-3.2 5.715 5.715 0 0 1 1.559.253m-96.673.11h4.036v3.72H192.8v13.8h-4.369V89.3c0-1.461-.293-1.785-2.018-3.155l-2.22-1.81v-.255h4.243V80.9c0-4.737 3.083-7.746 9.752-6.411l1.009 3.7-.212.172c-3.486-1.375-6.185-.506-6.185 2.528zm41.239 6.5v11.02h-4.354v-9.709c0-1.921-.5-4.247-3.532-4.247-2.866 0-3.991 2.108-3.991 4.434v9.522h-4.349V88.7c0-2.194-.116-2.528-1.887-3.645l-1.059-.723v-.192h7.114v2.66h.071a6.742 6.742 0 0 1 5.55-3.094c4.112 0 6.483 2.821 6.483 6.866m-89.345 7.523l.141.091s-2.164 3.468-2.159 3.468c-3.532.966-7.537-.061-7.537-5.764v-7.078c0-1.127-.182-1.067-2.623-3.084l-1.579-1.37v-.207h4.228L136.8 79.1h2.76v5.056h4.657v3.7h-4.657v7.912c0 3.15 2.154 3.226 5.186 2.326" transform="translate(-99.68 -74.171)"></path></svg></a> <svg xmlns="http://www.w3.org/2000/svg" width="201.188" height="24.44" viewBox="0 0 201.188 24.44"><path id="Path_2" data-name="Path 2" d="M14.482-14.638v-3.51H.7v3.51H5.616V0H9.568V-14.638ZM19.656,0V-7.982c0-1.586,1.092-2.08,3.328-2.08h.962V-13.65H23.27a3.422,3.422,0,0,0-3.484,2.964h-.13V-13.65H15.808V0ZM34.372,0H38.22V-13.65H34.372v8.866a2.173,2.173,0,0,1-2.418,1.976c-1.4,0-1.95-.936-1.95-2.6V-13.65H26.156v8.58c0,3.432,1.482,5.382,4.264,5.382a3.706,3.706,0,0,0,3.822-2.6h.13ZM46.436.312c3.51,0,5.85-1.924,5.85-4.55,0-2.366-1.534-3.718-4.5-4.108l-1.534-.208c-1.118-.156-1.43-.546-1.43-1.274,0-.676.52-1.144,1.82-1.144a4.563,4.563,0,0,1,3.146,1.4L52-11.83a6.861,6.861,0,0,0-5.564-2.132c-3.25,0-5.3,1.82-5.3,4.446,0,2.47,1.508,3.822,4.6,4.212l1.482.182c.962.13,1.378.468,1.378,1.144,0,.806-.52,1.3-2.028,1.3A4.746,4.746,0,0,1,42.952-4.42L40.69-2.132A7.126,7.126,0,0,0,46.436.312ZM61.776,0V-2.99h-2.5v-7.67h2.7v-2.99h-2.7v-3.692H55.822v2.236c0,.936-.312,1.456-1.352,1.456h-.962v2.99h1.924v6.682c0,2.6,1.4,3.978,4.056,3.978Zm8.476.312a7.4,7.4,0,0,0,5.72-2.262L74.048-4.342A4.326,4.326,0,0,1,70.694-2.7a2.682,2.682,0,0,1-3.016-2.938V-5.85H76.44V-6.994c0-3.692-1.82-6.968-6.344-6.968-4.108,0-6.4,2.808-6.4,7.124C63.7-2.47,66.066.312,70.252.312Zm-.078-11.44c1.534,0,2.288,1.118,2.288,2.782v.234H67.678V-8.32A2.5,2.5,0,0,1,70.174-11.128ZM87.542,0H91.39V-19.24H87.542v7.878h-.13a3.7,3.7,0,0,0-3.666-2.6c-3.458,0-5.252,2.5-5.252,7.124S80.288.312,83.746.312a3.727,3.727,0,0,0,3.666-2.6h.13ZM85.02-2.808A2.565,2.565,0,0,1,82.5-5.642V-8.008a2.565,2.565,0,0,1,2.522-2.834c1.456,0,2.522.754,2.522,2v4.03C87.542-3.562,86.476-2.808,85.02-2.808ZM97.214.286A2,2,0,0,0,99.5-1.794v-.52a2,2,0,0,0-2.288-2.08,2,2,0,0,0-2.288,2.08v.52A2,2,0,0,0,97.214.286ZM124.67,0l-5.9-18.148H113.88L107.9,0h4l1.3-4.316h6.058L120.562,0ZM118.3-7.67h-4.16l2-6.89h.13ZM132.548,0V-2.99h-1.716V-19.24h-3.848v15.5c0,2.418,1.2,3.744,3.822,3.744Zm4.732,0h3.952L142.9-5.772l.936-3.536h.078l.962,3.536L146.536,0h4.03l3.77-13.65h-3.562l-1.326,5.512-.936,4.16h-.1l-1.118-4.16L145.7-13.65h-3.51l-1.56,5.512-1.092,4.16h-.1l-.936-4.16-1.326-5.512h-3.718Zm31.2,0V-2.99h-1.274V-8.97c0-3.224-1.976-4.992-5.824-4.992-2.86,0-4.42.988-5.512,2.6l2.288,2.028a3.37,3.37,0,0,1,2.938-1.612c1.612,0,2.262.832,2.262,2.158v.858H161.2c-3.614,0-5.85,1.378-5.85,4.264,0,2.366,1.508,3.978,4.238,3.978,2.08,0,3.588-.936,4-2.7h.156A2.6,2.6,0,0,0,166.348,0Zm-7.462-2.366c-1.144,0-1.794-.468-1.794-1.456v-.39c0-.988.78-1.534,2.262-1.534h1.872v1.612C163.358-2.886,162.292-2.366,161.018-2.366ZM177.164-7.28,176.15-3.328h-.156l-.988-3.952-2-6.37h-3.822L173.966.7,173.5,2.21h-2.574V5.2h2.392c2.34,0,3.484-.988,4.186-3.094l5.252-15.756h-3.588ZM189.1.312c3.51,0,5.85-1.924,5.85-4.55,0-2.366-1.534-3.718-4.5-4.108l-1.534-.208c-1.118-.156-1.43-.546-1.43-1.274,0-.676.52-1.144,1.82-1.144a4.563,4.563,0,0,1,3.146,1.4l2.21-2.262a6.861,6.861,0,0,0-5.564-2.132c-3.25,0-5.3,1.82-5.3,4.446,0,2.47,1.508,3.822,4.6,4.212l1.482.182c.962.13,1.378.468,1.378,1.144,0,.806-.52,1.3-2.028,1.3a4.746,4.746,0,0,1-3.614-1.742l-2.262,2.288A7.126,7.126,0,0,0,189.1.312ZM199.6.286a2,2,0,0,0,2.288-2.08v-.52a2,2,0,0,0-2.288-2.08,2,2,0,0,0-2.288,2.08v.52A2,2,0,0,0,199.6.286Z" transform="translate(-0.702 19.24)" fill="#fff"></path></svg></div> <div class="tw-pb-3 [&amp;_*]:tw-text-[13px] lg:[&amp;_*]:tw-text-[14px] [&amp;_*]:tw-text-white [&amp;_a]:tw-no-underline hover:[&amp;_a]:tw-underline [&amp;_span]:tw-px-3 lg:[&amp;_span]:tw-px-4"><a href="https://www.bitdefender.com/site/view/legal-terms.html" title="Legal Information">Legal Information</a> <span>|</span> <a href="https://www.bitdefender.com/site/view/legal-privacy-policy-for-bitdefender-websites.html" title="Privacy Policy">Privacy Policy</a> <span>|</span> <a href="https://www.bitdefender.com/site/Main/contact/1" title="Contact Us">Contact Us</a></div> <div class="tw-flex tw-flex-col lg:tw-flex-row lg:tw-justify-between tw-items-center"><span class="tw-pb-3 lg:tw-pb-0 tw-text-[13px] lg:tw-text-[14px] tw-text-[#969696]">
            Copyright © 1997 - 2026 Bitdefender.
         </span> <div><div class="tw-flex tw-items-center tw-justify-center lg:tw-justify-end"><a aria-label="Facebook Bitdefender" title="Facebook Bitdefender" rel="nofollow" target="_blank" href="https://facebook.com/Bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" height="16" width="16" viewBox="0 0 512 512" class="tw-h-5 tw-w-5"><path opacity="1" fill="#595959" d="M512 256C512 114.6 397.4 0 256 0S0 114.6 0 256C0 376 82.7 476.8 194.2 504.5V334.2H141.4V256h52.8V222.3c0-87.1 39.4-127.5 125-127.5c16.2 0 44.2 3.2 55.7 6.4V172c-6-.6-16.5-1-29.6-1c-42 0-58.2 15.9-58.2 57.2V256h83.6l-14.4 78.2H287V510.1C413.8 494.8 512 386.9 512 256h0z"></path></svg></a> <a aria-label="Twitter Bitdefender" title="Twitter Bitdefender" rel="nofollow" target="_blank" href="https://twitter.com/bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" height="16" width="16" viewBox="0 0 512 512" class="tw-h-5 tw-w-5"><path opacity="1" fill="#595959" d="M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z"></path></svg></a> <a aria-label="Instagram Bitdefender" title="Instagram Bitdefender" rel="nofollow" target="_blank" href="https://instagram.com/bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" height="16" width="14" viewBox="0 0 448 512" class="tw-h-5 tw-w-5" data-v-0f536bc0=""><path opacity="1" fill="#595959" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z" data-v-0f536bc0=""></path></svg></a> <!----> <a aria-label="Youtube Bitdefender" title="Youtube Bitdefender" rel="nofollow" target="_blank" href="https://www.youtube.com/Bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" width="25.6" height="18" viewBox="0 0 25.6 18" class="tw-h-5 tw-w-5"><path id="Path_5" data-name="Path 5" d="M25.765-15.184A3.217,3.217,0,0,0,23.5-17.462c-2-.538-10-.538-10-.538s-8.005,0-10,.538a3.217,3.217,0,0,0-2.263,2.278A33.744,33.744,0,0,0,.7-8.982a33.744,33.744,0,0,0,.535,6.2A3.169,3.169,0,0,0,3.5-.538C5.495,0,13.5,0,13.5,0s8.005,0,10-.538A3.169,3.169,0,0,0,25.765-2.78a33.744,33.744,0,0,0,.535-6.2A33.744,33.744,0,0,0,25.765-15.184ZM10.882-5.175v-7.613l6.691,3.806L10.882-5.175Z" transform="translate(-0.7 18)" fill="#595959"></path></svg></a></div></div></div></div></footer></div></div></div></div><script nonce="DhcnhD3khTMePgXW">window.__NUXT__=(function(a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z,_,$,aa,ab,ac,ad,ae,af,ag,ah,ai,aj,ak,al,am,an,ao,ap,aq,ar,as,at,au,av,aw,ax,ay,az,aA,aB,aC,aD,aE,aF,aG,aH,aI,aJ,aK,aL,aM,aN,aO,aP,aQ,aR,aS,aT,aU,aV,aW,aX,aY,aZ,a_,a$,ba,bb,bc,bd,be,bf,bg,bh,bi,bj,bk,bl,bm,bn,bo,bp,bq,br,bs,bt,bu,bv,bw,bx,by,bz,bA,bB,bC){bu.HFS=ah;bu.LAB="labs";bu.BI="businessinsights";bu.CYB="cyberpedia";return {layout:"default",data:[{featuredPost:[{id:Y,title:Z,slug:_,feature_image:$,featured:v,published_at:aa,custom_excerpt:A,html:ab,tags:[{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:w,name:t,slug:x,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:A,reading_time:N,url:ac}],topPost:[{id:O,title:P,slug:Q,feature_image:R,featured:c,published_at:S,custom_excerpt:a,plaintext:"International police agencies are mowing through scam centers.\n\nINTERPOL has announced a “first-of-its-kind cybercrime operation” that has led to 201 arrests. Authorities across the Middle East and North Africa (MENA) have identified a further 382 suspects. The coordinated operation targeted online fraud, financial scams, malware distribution, and digital extortion, as global law enforcement agencies step up efforts to disrupt organized cybercrime at scale.\n\n\nKey takeaways\n\n\n * INTERPOL-led authorities across the MENA region arrested 201 suspects tied to cybercrime operations.\n * Investigators seized infrastructure linked to phishing, financial fraud, malware campaigns, and online scams.\n * The operation reflects a broader global trend of coordinated crackdowns on organized scam networks.\n * Cryptocurrency investment scams, romance fraud, and social media scams continue to generate billions in losses worldwide.\n * Despite sweeping crackdowns, cybercriminal groups remain highly adaptable and often re-emerge under new infrastructure.\n * Cybercitizens are encouraged to use security tools designed to detect scams.\n\n\n\nOperation Ramz\n\n\n\nThe operation, described by INTERPOL as the first coordinated cybercrime enforcement campaign of its kind in the MENA region, involved extensive intelligence sharing and collaboration among participating countries.\n\n“Thirteen countries from the Middle East and North Africa took part in Operation Ramz (October 2025 – 28 February 2026) which aimed to investigate and disrupt malicious infrastructure, identify and arrest suspects, and prevent future losses,” INTERPOL said in a press release.\n\nAuthorities reportedly dismantled malicious infrastructure, analyzed digital evidence, and identified suspects connected to a wide range of online criminal activity. The crackdown targeted operations linked to phishing, business email compromise (BEC), ransomware-related activity, and online financial fraud.\n\nNearly 8,000 pieces of crucial data and intelligence were disseminated among participating countries to initiate and support investigations.\n\nThe arrests come as international law enforcement agencies intensify pressure on cybercriminal ecosystems that increasingly operate across borders, using cryptocurrency payments, encrypted messaging platforms, fake identities, and large-scale scam infrastructures to target victims worldwide.\n\n\nOperational highlights\n\n\n\nINTERPOL shared several operational details illustrating the wide scope of the crackdown.\n\n * In Qatar, investigators detected compromised devices whose owners were unaware their systems had been hijacked and used to distribute cyber threats. Authorities secured the devices and alerted victims so they could strengthen their defenses.\n * In Jordan, police uncovered a fraudulent investment scheme operating through a fake trading platform. A police raid found 15 individuals carrying out the scams, but later determined they were trafficking victims who had been lured from Asia with false job offers, had their passports confiscated, and were coerced into participating in the fraud. Two suspected organizers were arrested.\n * Authorities in Oman identified a vulnerable server hosted in a private residence that contained sensitive information and had been compromised by malware. Investigators shut down the system to prevent further abuse.\n * In Algeria, police dismantled a phishing-as-a-service operation, seizing servers, devices, and phishing tools used to support cybercrime campaigns. One suspect was arrested.\n * Meanwhile, Moroccan authorities confiscated computers, phones, and storage devices containing banking data and phishing software. Three individuals are facing judicial proceedings, while additional suspects are under investigation.\n\n\nGlobal cybercrime crackdowns are accelerating\n\n\n\nThe Ramz operation in the MENA region follows several high-profile disruptions to international cybercrime over the past year.\n\nIn April, a law enforcement effort led by the US Department of Justice, the FBI, Dubai Police, and Chinese authorities resulted in at least 276 arrests linked to cryptocurrency investment fraud networks in multiple countries. Authorities dismantled at least nine scam compounds allegedly used to run large-scale online fraud campaigns targeting victims primarily in the United States.\n\nThe investigators say the scam networks relied heavily on social engineering tactics to build emotional trust with victims before persuading them to invest increasing amounts of money into fraudulent cryptocurrency schemes.\n\nThese operations—often referred to as “pig butchering” scams—are among the world’s fastest-growing forms of organized online fraud.\n\nINTERPOL and regional law enforcement agencies have also increasingly focused on infrastructure-level disruption.\n\nIn a separate operation across Asia-Pacific countries, INTERPOL announced the takedown of more than 20,000 malicious IP addresses and domains tied to infostealer malware campaigns. Authorities seized servers and arrested suspects linked to malware operations used to steal credentials, cryptocurrency wallet information, and financial data.\n\n\nRomance scams and social media fraud continue to surge\n\n\n\nWhile authorities are making arrests, consumer losses linked to online scams continue to climb.\n\nA recent report from Britain highlighted that romance scam victims in the UK lost roughly £102 million in 2025 alone, with criminals increasingly using dating platforms and social media to manipulate victims emotionally before requesting money transfers or cryptocurrency payments.\n\nAt the same time, data from the U.S. Federal Trade Commission showed Americans lost an estimated $2.1 billion to social media scams in 2025, making social platforms one of the largest sources of fraud-related losses.\n\nThe Bitdefender 2025 Consumer Cybersecurity Survey shows social media is attackers’ preferred scam-delivery system.\n\nKey findings from our report:\n\n * Social media is the top scam delivery channel (34%), underscoring how deception blends seamlessly into platforms where people spend much of their time.\n * 7 out of 10 respondents have encountered scams of some type in the last 12 months.\n * 1 in 7 consumers fell victim to a scam in the past year.\n * In the context of AI, 37% named deepfakes as their biggest concern.\n\nCybercriminals increasingly rely on fake investment opportunities, impersonation, cloned accounts, and fraudulent advertisements distributed through mainstream platforms where users lower their guard.\n\nScam operations have evolved into highly organized criminal enterprises. Some groups operate with call-center-style structures, scripted manipulation techniques, multilingual operators, money laundering teams, and dedicated technical infrastructure.\n\n\nCoordinated busts\n\n\n\nCybercrime investigations are notoriously difficult. Criminal groups often spread infrastructure across multiple countries, rely on cryptocurrency transactions, and rapidly migrate operations when servers or domains are seized. That makes international cooperation critical.\n\nOperations coordinated through organizations like INTERPOL allow participating countries to share intelligence, identify overlapping investigations, trace infrastructure, and act in unison against criminal networks.\n\nAuthorities hope synchronized enforcement makes it harder for cybercriminal groups to quickly regroup elsewhere. Still, arrests alone are unlikely to eliminate large-scale scam ecosystems.\n\nPast crackdowns have shown that fraud networks often rebuild using new domains, fresh social media accounts, alternative messaging platforms, and replacement infrastructure within weeks.\n\nThe challenge grows even more complicated as criminals adopt AI-assisted tactics, including deepfake impersonation, voice cloning, and automated scam messaging.\n\nRead: Got a Silent Call From an Unknown Number? It’s Not Random, It’s a Scam\n\nRead: Older Adults Lost Billions to Scammers Last Year, FBI Warns\n\n\nHow to protect yourself from sophisticated scams\n\n\n\nAs online fraud operations continue to expand globally, internet users should exercise caution when interacting with strangers online — especially in conversations involving investments, cryptocurrency, urgent financial requests, or emotional manipulation.\n\nHere are some practical tips to reduce your risk:\n\n * Be skeptical of investment opportunities promoted through social media, messaging apps or dating platforms.\n * Never send money or cryptocurrency to someone you have not verified independently.\n * Watch for pressure tactics involving urgency, secrecy, or emotional manipulation.\n * Enable multi-factor authentication on important accounts.\n * Use strong, unique passwords and consider a password manager.\n * Avoid downloading attachments or clicking links from unexpected messages.\n * Keep devices and security software updated.\n * Research companies, trading platforms, and investment offers independently before sending funds.\n\n\nUse security tools that detect scams\n\n\n\nSecurity solutions with scam-detection features can help identify phishing links, fraudulent messages, and suspicious websites.\n\nTo help people stay ahead of evolving threats, Bitdefender has introduced Scam Radar, a new feature integrated into Bitdefender Mobile Security for Android and Bitdefender Mobile Security for iOS.\n\nWhen in doubt about an unsolicited phone call, text or social media interaction, use Scamio, our free scam detector and prevention service. Simply describe your situation and let Scamio guide you to safety.\n\nYou may also want to read:\n\nGlobal Scam Crackdown: 276 Arrested, Crypto Fraud Networks Dismantled\n\nBrits Lost £102 Million to Romance Scams Last Year\n\nSocial Media Scams Cost Americans $2.1 Billion in 2025, FTC Warns",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:T,url:U},{id:aj,title:ak,slug:al,feature_image:am,featured:c,published_at:an,custom_excerpt:a,plaintext:"Scammers have been actively exploiting the hype surrounding football tournaments, and the demand for the biggest event of the year could bring devastating financial losses for fans, Lloyds Bank and the UK Home Office warned.\n\n\nKey takeways\n\n * Lloyds bank says football ticket fraud has surged in recent seasons, and experts believe the World Cup could make the fraud problem even worse.\n * Football ticket scams rose by 36% with victims losing an average of £215\n * Many scams originated on social media platforms\n\nAccording to Lloyds, football-related scams now account for 32% of all ticket scams reported to the bank.  The findings are based on thousands of scam cases recorded between October 2025 and March 2026.\n\nLloyds also noted that scammers heavily target supporters of high-profile clubs like Arsenal, Liverpool, Chelsea, and Manchester United, as well as major events such as the FA Cup Final and Champions League Final.\n\nThe financial institution, alongside the UK government, believes that the same tactics will increase dramatically around the World Cup 2026.\n\n\nWhy the World Cup is a massive opportunity for scammers\n\nThe 2026 FIFA World Cup is expected to be the largest World Cup ever, with millions of fans traveling internationally across North America.\n\nAt the same time, ticket prices have skyrocketed.\n\nThe bank warns that these rising costs may push fans toward:\n\n * Unofficial resale platforms\n * Social media sellers\n * “Exclusive” presale offers\n * Fake hospitality packages\n * Last-minute bargain deals\n\nThat’s exactly where fraudsters operate.\n\nThe bank says scammers exploit panic, urgency, and the fear of missing out, especially when fans believe tickets are about to sell out.\n\n“As excitement builds for the World Cup, fraudsters are preparing to exploit loyal fans searching for tickets. I urge all football supporters hunting for tickets to Stop! Think Fraud and show fraudsters the red card,” said Lord Hanson, Minister for Fraud at the UK Home Office.\n\n\nHow these ticket scams usually work\n\nOne of the most important findings is the role social media plays in ticket fraud. The bank says many football ticket scams begin on social platforms like Facebook and Instagram before moving towards WhatsApp for payment.\n\n“Most of the football ticket scams we see start on social media – especially Facebook and Instagram – before the criminal moves the buyer onto WhatsApp and insists on a bank transfer to pay,” Lloyds Fraud Prevention Director Liz Ziegler said. “It’s incredibly convincing, and we don’t want fans to lose their money trying to support their team. We’re urging supporters to stay alert and stick to official ticketing channels.”\n\nFraudsters often advertise:\n\n * “Spare tickets”\n * VIP access\n * Hospitality bundles\n * Waiting list placements\n * Early-release offers\n\nVictims are then pressured to pay quickly via bank transfer, payment apps, and crypto payments.\n\nLloyds also said that fraudsters use counterfeit QR codes, fake ticket screenshots, cloned confirmation emails, AI-generated promotional graphics, and fake customer reviews. Making matters worse, some victims only realize they were scammed after arriving at the stadium gates.\n\n\nHow fans can stay safe\n\nWith demand for World Cup tickets expected to intensify, it’s highly recommended to follow a few key safety rules.\n\n\nBuy only from official sources\n\nWhenever possible, buy tickets directly from FIFA or authorized resale platforms.\n\n\nAvoid bank transfers\n\nBank transfers are among scammers’ preferred payment methods because recovering the money is extremely difficult.\n\n\nBe suspicious of ‘too-good-to-be-true’ offers\n\nCheap final tickets, exclusive access claims, or urgent “limited time” offers should raise red flags.\n\n\nVerify URLs carefully\n\nScammers often create websites that closely mimic official FIFA branding and ticket pages.\n\n\nDon’t trust screenshots alone\n\nFake QR codes and edited confirmations are increasingly common.\n\n\nWatch for pressure tactics\n\nUrgency is a key scam indicator. If someone pressures you to pay immediately, slow down.\n\n\nUse free scam detection tools before clicking\n\nTools like Bitdefender Scamio and Bitdefender Link Checker can help analyze suspicious messages, links, and websites before you enter personal or payment information.\n\n\nDon’t forget to protect your mobile device\n\nMost ticket scams start on your phone through social media and messaging apps. Installing a mobile security solution (for Android or iOS) with scam protection can help block malicious links, phishing attempts, and fraudulent pages before you even interact with them.",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:C,name:D,slug:E,profile_image:F,cover_image:a,bio:G,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:ao,url:ap},{id:aq,title:ar,slug:as,feature_image:at,featured:c,published_at:au,custom_excerpt:a,plaintext:"For years, texting between iPhones and Android devices came with a stubborn privacy gap. Messages sent through Apple’s iMessage system were encrypted. Google Messages chats between Android users could also be encrypted. But once a conversation crossed the “blue bubble vs. green bubble” divide, those protections largely disappeared. That is finally starting to change.\n\nApple announced that end-to-end encrypted (E2EE) RCS messaging is now rolling out in beta through iOS 26.5, developed in collaboration with Google and the GSMA, the organization behind the RCS standard. The update brings a major privacy upgrade to cross-platform texting.\n\n\nKey takeaways\n\n\n * Apple and Google are rolling out end-to-end encrypted RCS messaging between iPhones and Android devices.\n * Messages protected with E2EE can’t be read by Apple, Google, carriers, or hackers intercepting traffic.\n * The feature is rolling out in beta and depends on carrier support.\n * Users will need updated software and compatible messaging apps to benefit.\n * Encryption only works when both sides support the new standard.\n\n\n\nWhat is RCS and why it matters\n\n\n\nRich Communication Services (RCS) is a communication protocol standard for instant messaging developed and defined by the GSM Association (GSMA). It’s the modern successor of SMS and MMS on cellular networks with more modern features including high-resolution image and video support, typing indicators, file sharing, and improved group chat functionality, among other things.\n\nTraditional SMS text messaging is decades old and notoriously insecure. Even modern RCS messaging lacked full encryption in many iPhone-to-Android chats, which meant messages could potentially be exposed during transmission.\n\nThe new system changes that. By using end-to-end encryption, it ensures only the sender and intended recipient can read the messages.\n\nIn practical terms, this helps protect:\n\n * Private conversations\n * Shared photos and videos\n * Sensitive personal information\n * Verification codes and login details\n * Financial or medical discussions\n\nIt also reduces risks from network interception, rogue Wi-Fi attacks, and certain forms of carrier-level surveillance.\n\nThe move is especially significant because cross-platform texting has historically been the weak link in mainstream messaging security.\n\nFrom Apple’s May 11 announcement:\n\nApple and Google have led a cross-industry effort to bring end-to-end encryption to Rich Communication Services (RCS), making the cross-platform messaging format that replaces traditional SMS more secure and private.\n\nStarting today, end-to-end encrypted RCS messaging begins rolling out in beta for iPhone users running iOS 26.5 with supported carriers and Android users on the latest version of Google Messages. When RCS messages are end-to-end encrypted, they can’t be read while they’re sent between devices. Users will know that a conversation is end-to-end encrypted when they see a new lock icon in their RCS chats. Encryption is on by default and will be automatically enabled over time for new and existing RCS conversations.\n\n\nWhat consumers will notice\n\n\n\nFor most users, the biggest difference may simply be peace of mind. Encrypted RCS chats still look and feel like regular modern messaging experiences, including support for:\n\n * High-quality media sharing\n * Read receipts\n * Typing indicators\n * Group messaging\n\nBut users may also start seeing visual indicators that a conversation is protected, such as a lock icon or “Encrypted” label.\n\nThe rollout is gradual, however. Not every device or carrier supports encrypted RCS yet. The feature currently requires:\n\n * iOS 26.5 on iPhone\n * The latest Google Messages app on Android\n * Carrier support for the updated RCS profile\n\n\nHow to activate end-to-end encrypted RCS messaging in iOS\n\nIn the Settings app, tap Apps\n\n * Tap Messages\n * Tap RCS Messaging\n * Turn End-to-End Encryption (Beta) on or off\n\n(Starting with iOS 26.5, the feature is on by default)\n\nApple informs iPhone users that, starting now, iOS supports end-to-end encrypted RCS messaging.\n\n\nWhat RCS brings to the table\n\n\n\nAccording to Google support, when RCS chats is turned on, you can:\n\n * Share high-resolution photos and videos.\n * Know when someone is typing.\n * Get read receipts, which show when someone has read or received your message. Read receipts also show your contact when you read their message.\n * Send messages over mobile data and Wi-Fi.\n * Rename, edit, and remove yourself from group chats.\n * Keep your conversations secure with end-to-end encryption if you are communicating with other Google Messages users.\n\n\nNot every conversation is encrypted yet\n\n\n\nConsumers should understand an important limitation: encryption is not guaranteed in every cross-platform chat — at least not yet.\n\nBecause the rollout is gradual and depends on carrier compatibility, some conversations may still fall back to unencrypted messaging.\n\nSecurity researchers and tech outlets warn users to check for encryption indicators rather than assume every RCS chat is protected.\n\nThat means consumers should still be cautious about sending highly sensitive information over text if they are unsure whether encryption is active.\n\n\nWhat you should do now\n\n\n\nIf you use both iPhone and Android contacts regularly, here are a few simple steps to strengthen your privacy:\n\nUpdate your devices\n\nInstall the latest operating system updates:\n\n * iPhone users should update to iOS 26.5\n * Android users should update Google Messages and Android software\n\nOlder devices or outdated apps may not support encrypted RCS.\n\nLook for encryption indicators\n\nPay attention to lock icons or “Encrypted” labels in conversations. Those indicators confirm the chat is protected with end-to-end encryption.\n\nAvoid SMS fallback when possible\n\nIf encryption is unavailable and a conversation falls back to SMS, messages lose the modern protections and remain vulnerable to interception.\n\nContinue using secure messaging apps for highly sensitive conversations\n\nApps like Signal and WhatsApp still offer mature end-to-end encryption systems with broader cross-platform support and fewer carrier dependencies.\n\nIt’s important to note that iOS 26.5 also carries a long list of security fixes, making it all the more important to update your iPhone or iPad. Many of those fixes are also offered to older-generation device models in iOS 18.7.9 and iPadOS 18.7.9, iPadOS 17.7.11, iOS 16.7.16 and iPadOS 16.7.16, and iOS 15.8.8 and iPadOS 15.8.8.\n\nMac users also get the security fixes as part of their corresponding OS updates. Visit Apple Support to see all the updates available from Cupertino this week.\n\nYou may also want to read:\n\nAndroid ‘Quick Share’ Now Supports iOS ‘AirDrop’ – Here’s How to Use It Securely\n\nApple Taps Google’s Gemini to Power Siri, Says Privacy Remains a Priority\n\nWhich Big Tech Companies Do You Trust (or Not)? We Asked Netizens\n\n \n\n \n\n ",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:av,name:aw,slug:ax,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:ay,url:az}],postsWhite:[{id:aA,title:aB,slug:aC,feature_image:aD,featured:c,published_at:aE,custom_excerpt:a,html:aF,tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:aG,reading_time:V,url:aH},{id:aI,title:aJ,slug:aK,feature_image:aL,featured:c,published_at:aM,custom_excerpt:a,html:aN,tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:aO,name:aP,slug:aQ,profile_image:aR,cover_image:a,bio:aS,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:aT,reading_time:y,url:aU},{id:O,title:P,slug:Q,feature_image:R,featured:c,published_at:S,custom_excerpt:a,html:ad,tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:T,reading_time:ae,url:U}],postsBlack:[{id:Y,title:Z,slug:_,feature_image:$,featured:v,published_at:aa,custom_excerpt:A,html:ab,tags:[{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:w,name:t,slug:x,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:A,reading_time:N,url:ac},{id:"6a0337042fa53a9f2eef72e3",title:"Instagram paid follower scams can cost you more than your money",slug:"instagram-paid-follower-scam",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstagram-paid-follower---fake-engagement-scams.jpg",featured:c,published_at:"2026-05-12T17:23:34.000+03:00",custom_excerpt:aV,html:"\u003Cp\u003E\u003Cem\u003EInstagram paid follower scams promise quick popularity, instant credibility and effortless growth. However, many “cheap followers” and “real engagement” promises lie fake accounts, phishing pages, stolen credentials and payment traps that exploit Instagram users.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EInstagram paid follower scams often deliver fake followers, bot likes, recycled engagement or nothing at all after payment\u003C\u002Fli\u003E\u003Cli\u003EBuying fake Instagram followers can damage your account’s credibility and engagement rate\u003C\u002Fli\u003E\u003Cli\u003ESome Instagram engagement scams are phishing schemes that steal passwords, recovery codes or two-factor authentication details\u003C\u002Fli\u003E\u003Cli\u003ESafer Instagram growth comes from patience, authentic content, verified partnerships, secure account settings and avoiding “guaranteed growth” offers\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"why-instagram-paid-follower-scams-work\"\u003EWhy Instagram paid follower scams work\u003C\u002Fh2\u003E\u003Cp\u003EInstagram is built around visibility and reach. Follower counts, likes, comments and views can influence how users judge creators, small businesses, influencers, and even ordinary accounts. That pressure makes paid follower offers tempting, especially when they promise thousands of followers overnight for a few dollars.\u003C\u002Fp\u003E\u003Cp\u003EScammers understand this perfectly. They target people who want social proof fast, such as new creators, side-hustlers, small shops, musicians, coaches, students and anyone else trying to look more established online. The pitch usually sounds harmless and may include the following keywords:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E“real followers”\u003C\u002Fli\u003E\u003Cli\u003E“organic growth”\u003C\u002Fli\u003E\u003Cli\u003E“safe promotion”\u003C\u002Fli\u003E\u003Cli\u003E“no password needed”\u003C\u002Fli\u003E\u003Cli\u003E“guaranteed engagement”\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EIn reality, many of these services are not growth services at all. They either sell low-quality bot traffic, run phishing campaigns, abuse stolen accounts or collect payments for results they’ll never deliver.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FHow-paid-Instagram-follower-scams-work.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1920\" height=\"1280\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FHow-paid-Instagram-follower-scams-work.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F05\u002FHow-paid-Instagram-follower-scams-work.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1600\u002F2026\u002F05\u002FHow-paid-Instagram-follower-scams-work.jpg 1600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FHow-paid-Instagram-follower-scams-work.jpg 1920w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EMeta has \u003Ca href=\"https:\u002F\u002Ftransparency.meta.com\u002Freports\u002Fcommunity-standards-enforcement\u002Ffake-accounts\u002F\"\u003Esaid\u003C\u002Fa\u003E that Instagram prohibits misrepresentation, fake accounts and artificially inflating the popularity content under its integrity and authenticity efforts. Instagram has also used automated systems to flag spam across comments, tags, story views and followers, with tools designed to help users remove suspicious activity.\u003C\u002Fp\u003E\u003Ch2 id=\"common-instagram-paid-follower-scams\"\u003ECommon Instagram paid follower scams\u003C\u002Fh2\u003E\u003Ch3 id=\"fake-follower-package\"\u003EFake follower package\u003C\u002Fh3\u003E\u003Cp\u003EThe simplest version is also the most common: the fake follower package. A website or account offers thousands of followers for a low price. Some followers may appear briefly, but many are bots, inactive accounts or suspicious profiles that disappear when Instagram performs its periodical sweep to remove suspicious activity.\u003C\u002Fp\u003E\u003Ch3 id=\"%E2%80%98growth-manager%E2%80%99-scam\"\u003E‘Growth manager’ scam\u003C\u002Fh3\u003E\u003Cp\u003EAnother version is the “growth manager” scam. In this scenario, someone contacts you by DM and claims they can grow your account through influencer networks, secret algorithms tricks or paid promotion. They may ask for an upfront fee, access to your account or a login through a fake analytics dashboard.\u003C\u002Fp\u003E\u003Ch3 id=\"fake-engagement-platform\"\u003EFake engagement platform\u003C\u002Fh3\u003E\u003Cp\u003EA more dangerous variation is the fake engagement platform. These sites ask you to connect your Instagram account to “track growth,” “activate delivery” or “verify your profile.” The login page might even look convincing enough to prompt you to lower your guard, but its real purpose is credential theft. Once scammers have your password and 2FA codes, they can lock you out of your account, change your recovery details and use your account to target your friends or followers. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-phishing-fake-login-pages\"\u003EPhishing scams on Instagram\u003C\u002Fa\u003E commonly impersonate trusted systems or services to steal login details and take over accounts.\u003C\u002Fp\u003E\u003Ch3 id=\"fake-collaborations\"\u003EFake collaborations\u003C\u002Fh3\u003E\u003Cp\u003ESome scammers also use fake collaboration opportunities as bait. For example, they may send you a page that offers paid shoutouts, guaranteed engagement from a “creator network” or promotion through a large account. After payment, the promised exposure never arrives, or the engagement comes from bots that drown your account in a sea of spammy comments, making it look less trustworthy.\u003C\u002Fp\u003E\u003Ch2 id=\"why-fake-instagram-followers-are-dangerous\"\u003EWhy fake Instagram followers are dangerous\u003C\u002Fh2\u003E\u003Cp\u003EThe obvious risk is losing money. However, much like with other \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-scams\"\u003EInstagram scams\u003C\u002Fa\u003E, paid follower scams can cause more serious harm than a wasted payment.\u003C\u002Fp\u003E\u003Ch3 id=\"fake-followers-hurt-your-organic-engagement\"\u003EFake followers hurt your organic engagement\u003C\u002Fh3\u003E\u003Cp\u003EFake followers do not care about your posts, products or content. That can distort your engagement rate because your audience grows on paper while real interaction stays flat. For creators and small businesses, this can make the account look suspicious to brands, customers and potential collaborators.\u003C\u002Fp\u003E\u003Ch3 id=\"you-can-lose-your-account\"\u003EYou can lose your account\u003C\u002Fh3\u003E\u003Cp\u003EThe cybersecurity risk is even more serious. If you enter your Instagram credentials into a fake growth website, scammers may gain access to your account. From there, they can impersonate you, message your contacts, promote \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-crypto-scams\"\u003Ecrypto scams\u003C\u002Fa\u003E, post malicious links or demand payment to return the account.\u003C\u002Fp\u003E\u003Cp\u003EFor creators, influencers and small businesses, Instagram accounts can be a revenue channel, a portfolio and a reputation-building asset. That’s why account takeover risk deserves more attention than follower count. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fsecurity-for-creators\"\u003E\u003Cstrong\u003EBitdefender Security for Creators\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E is built around this problem, offering protection for creators’ channels, emails and devices, including 24\u002F7 monitoring for social channel takeover attempts and suspicious account changes.\u003C\u002Fp\u003E\u003Ch3 id=\"reputation-damage\"\u003EReputation damage\u003C\u002Fh3\u003E\u003Cp\u003EThere is also reputational risk. Fake followers are often easy to spot. An account with 50,000 followers but only 20 likes per post raises questions. So does a comment section filled with generic praise, emoji spam or irrelevant replies. For influencers, coaches, sellers and creators, fake engagement can undermine the very credibility they thrive on and seek to build.\u003C\u002Fp\u003E\u003Ch3 id=\"legal-issues\"\u003ELegal issues\u003C\u002Fh3\u003E\u003Cp\u003EThe legal and compliance angle is also important, more so for people using Instagram commercially. The FTC’s \u003Ca href=\"https:\u002F\u002Fwww.ftc.gov\u002Fbusiness-guidance\u002Fadvertising-marketing\u002Fendorsements-influencers-reviews\"\u003Erule\u003C\u002Fa\u003E on consumer reviews and testimonials addresses fake indicators of social media influence, including fabricated followers, views or engagement when used deceptively in commercial contexts.\u003C\u002Fp\u003E\u003Ch3 id=\"how-to-spot-an-instagram-engagement-scam\"\u003EHow to spot an Instagram engagement scam\u003C\u002Fh3\u003E\u003Cp\u003EPaid follower scams on Instagram rely on unrealistic promises, unlike scammers on most of its counterparts, which exploit urgency and secrecy. Be careful if a service guarantees a specific follower number in a very short time, claims to know “algorithm loopholes” or says it can deliver real engagement without explaining how.\u003C\u002Fp\u003E\u003Cp\u003EHere are common red flags you should watch for:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPrices far below legitimate advertising or creator promotion costs\u003C\u002Fli\u003E\u003Cli\u003ERequests for your Instagram password, backup codes or 2FA code\u003C\u002Fli\u003E\u003Cli\u003EPayment requests through crypto, gift cards, wire transfer or unofficial channels\u003C\u002Fli\u003E\u003Cli\u003EVague claims such as “100% real users” with no transparent methodology\u003C\u002Fli\u003E\u003Cli\u003EGeneric testimonials, fake review screenshots or stolen influencer photos\u003C\u002Fli\u003E\u003Cli\u003ENo company details, refund policy, privacy policy or support channel\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EA legitimate marketing service should never need your password to run ads or advise on content strategy. If a service asks you to disable 2FA, share a recovery code or log in through a link sent by DM, treat it as an account takeover attempt.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstagram-paid-follower-scam--red-flags.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1080\" height=\"1270\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FInstagram-paid-follower-scam--red-flags.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F05\u002FInstagram-paid-follower-scam--red-flags.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstagram-paid-follower-scam--red-flags.jpg 1080w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EWhen in doubt, do not rely on instinct alone. A suspicious DM, “limited time” follower package, QR code or login link can be checked with a scam detection tool before you click, pay or share information. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003E\u003Cstrong\u003EBitdefender Scamio\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, for example, is designed to analyze potentially fraudulent messages, links, images, QR codes and described scenarios, giving you a practical way to pause before a scam can turn in to a payment loss or account takeover.\u003C\u002Fp\u003E\u003Ch2 id=\"what-to-do-instead-of-buying-followers\"\u003EWhat to do instead of buying followers\u003C\u002Fh2\u003E\u003Cp\u003EThe safer alternative is slower, but it builds something scammers can’t sell: trust. Focus on content that attracts the right audience rather than inflating the wrong number.\u003C\u002Fp\u003E\u003Cp\u003EUse Instagram’s native tools, review your account insights, test posting formats and, if you have a budget, promote content through legitimate ad channels. Collaborate with real creators, disclose paid partnerships properly and avoid any service that promises guaranteed followers without real audience targeting.\u003C\u002Fp\u003E\u003Cp\u003EFor personal safety, secure your account before you need to recover it. Use a strong unique password (\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpassword-manager\"\u003EBitdefender SecurePass\u003C\u002Fa\u003E can help you avoid password fatigue), enable 2FA, review connected apps and be skeptical of links in DMs that ask you to log in again.\u003C\u002Fp\u003E\u003Cp\u003EIf you have already paid for followers, avoid giving the seller more information. If you shared your password, change it immediately, enable 2FA, remove suspicious connected apps and check your email and phone number in Instagram settings. If you have lost access, use \u003Ca href=\"https:\u002F\u002Fhelp.instagram.com\u002F345310197245685\u002F\"\u003EInstagram’s official account recovery process\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FAlready-paid-for-followers-Do-this-next.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1080\" height=\"1280\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FAlready-paid-for-followers-Do-this-next.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F05\u002FAlready-paid-for-followers-Do-this-next.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FAlready-paid-for-followers-Do-this-next.jpg 1080w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EAfter dealing with a suspicious seller, you don’t stop at checking just the Instagram account. Check whether the email address, phone number or other personal details you used have been exposed in breaches or are appearing in places they should not. Digital identity monitoring tools, like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\"\u003E\u003Cstrong\u003EBitdefender Digital Identity Protection\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, can help users track data exposure, receive breach alerts and spot signs of impersonation that may follow after personal information is mishandled.\u003C\u002Fp\u003E\u003Ch2 id=\"conclusion\"\u003EConclusion\u003C\u002Fh2\u003E\u003Cp\u003EInstagram paid follower scams exploit the desire to look popular, credible or successful online. But fake followers do not create real influence. They can drain your money, weaken your engagement, expose your account to criminals and damage the trust you were trying to build.\u003C\u002Fp\u003E\u003Cp\u003EThe safest way to grow on Instagram is to treat follower count as an outcome, not a shortcut. Real engagement comes from real people. Anything that promises instant credibility for a small fee should be treated as a potential scam.\u003C\u002Fp\u003E\u003Ch2 id=\"frequently-asked-questions-faq\"\u003EFrequently asked questions (FAQ)\u003C\u002Fh2\u003E\u003Ch3 id=\"do-people-really-pay-for-instagram-followers\"\u003EDo people really pay for Instagram followers?\u003C\u002Fh3\u003E\u003Cp\u003EYes. Some people pay for Instagram followers because they want to look more popular, attract brand deals, boost a business page or create the appearance of credibility. Scammers exploit this demand by selling fake followers, bot engagement, fake promotion packages or phishing links disguised as growth tools.\u003C\u002Fp\u003E\u003Ch3 id=\"how-to-tell-if-ig-followers-are-fake\"\u003EHow to tell if IG followers are fake?\u003C\u002Fh3\u003E\u003Cp\u003EFake Instagram followers often have incomplete profiles, no profile photo, strange usernames, little original content, low activity, private profiles or generic comments. A major warning sign is a mismatch between follower count and engagement, such as an account with thousands of followers but very few likes, comments or meaningful interactions.\u003C\u002Fp\u003E\u003Ch3 id=\"is-it-illegal-to-pay-for-followers-on-instagram\"\u003EIs it illegal to pay for followers on Instagram?\u003C\u002Fh3\u003E\u003Cp\u003EPaying for followers is generally a platform policy and trust issue, but it can create legal trouble when fake followers or fake engagement are used deceptively in a commercial context. Even when it does not cross into outright illegality, buying followers or engagement can still violate Instagram’s rules and damage your account performance. Instagram may remove fake followers, likes or comments, restrict suspicious activity, reduce the visibility of content that appears artificially boosted or otherwise limit organic reach. In the end, a shortcut can make the account less visible.\u003C\u002Fp\u003E",tags:[{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:w,name:t,slug:x,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:aV,reading_time:N,url:"\u002Fblog\u002Fhotforsecurity\u002Finstagram-paid-follower-scam\u002F"},{id:"6a01ee2f2fa53a9f2eef7127",title:"Instagram Drops Encrypted DMs — What This Means for You",slug:"instagram-drops-encrypted-dms",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Finstagram-dm-encryption.png",featured:c,published_at:"2026-05-11T18:39:16.000+03:00",custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003EInstagram parent company Meta has quietly abandoned encrypted direct messages on the popular social media platform, marking a reversal in the company’s push toward privacy-centric messaging.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAs of May 8, Instagram users can no longer send end-to-end encrypted DMs, according to updated support documentation. The decision comes less than a year after Meta disclosed plans to use conversations with its AI assistant to personalize ads and content recommendations across Facebook and Instagram.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003EMeta has officially ended end-to-end encrypted (E2EE) direct messages on Instagram.\u003C\u002Fli\u003E\n\u003Cli\u003EMeta can now access and process private Instagram chats for moderation and other internal purposes.\u003C\u002Fli\u003E\n\u003Cli\u003EThe move reverses years of Meta messaging around ‘privacy-focused’ communication.\u003C\u002Fli\u003E\n\u003Cli\u003EMeta previously announced plans to use conversations with its AI chatbot to personalize ads and recommendations across Facebook and Instagram.\u003C\u002Fli\u003E\n\u003Cli\u003EThe combined changes could significantly expand the amount of user data available for profiling and advertising.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"a-sharp-reversal-on-encryption\"\u003EA sharp reversal on encryption\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EMeta spent years publicly advocating for stronger encryption across its platforms.\u003C\u002Fp\u003E\u003Cp\u003ECEO Mark Zuckerberg earlier described private, encrypted messaging as the future of social networking. Instagram’s optional E2EE chats were gradually introduced starting in 2023 as part of that broader strategy.\u003C\u002Fp\u003E\u003Cp\u003ENow, that feature is gone.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.theregister.com\u002Fsecurity\u002F2026\u002F05\u002F08\u002Fmeta-u-turns-on-encryption-push-for-instagram-as-dms-go-plaintext\u002F5235705\"\u003EAccording to\u003C\u002Fa\u003E Meta, “very few people” used encrypted Instagram chats, and the company is encouraging users who want secure messaging to switch to WhatsApp instead.\u003C\u002Fp\u003E\u003Cp\u003EInstagram’s help documentation \u003Ca href=\"https:\u002F\u002Fhelp.instagram.com\u002F491565145294150\"\u003Esays\u003C\u002Fa\u003E encrypted conversations and associated media may need to be downloaded before access disappears.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Finsta-support-doc-screenshot.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"787\" height=\"519\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002Finsta-support-doc-screenshot.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Finsta-support-doc-screenshot.jpg 787w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003E\u003Cem\u003EAn Instagram support document informs users that messaging on the social platform is no longer end-to-end encrypted\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EWithout E2EE, messages are no longer protected from attackers taking over a person's account or from Meta itself accessing their contents.\u003C\u002Fp\u003E\u003Ch2 id=\"meta%E2%80%99s-ai-ad-personalization-push\"\u003EMeta’s AI ad personalization push\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn late 2025, Meta \u003Ca href=\"https:\u002F\u002Fabout.fb.com\u002Fnews\u002F2025\u002F10\u002Fimproving-your-recommendations-apps-ai-meta\u002F\"\u003Eannounced\u003C\u002Fa\u003E it would begin \u003Cstrong\u003Eusing interactions with Meta AI to personalize ads and content recommendations\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003EThe policy applies to conversations with Meta AI across services like Facebook, Instagram, Messenger, and some Meta-integrated apps.\u003C\u002Fp\u003E\u003Cp\u003EAccording to Meta, the system can use AI chat interactions to influence:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EAds shown across Meta platforms\u003C\u002Fli\u003E\u003Cli\u003ERecommended posts and reels\u003C\u002Fli\u003E\u003Cli\u003EPersonalized content experiences\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EMeta says it excludes certain sensitive categories from ad targeting, including religion, health, race, politics, and sexual orientation.\u003C\u002Fp\u003E\u003Cp\u003EHowever, modern AI systems can infer highly sensitive traits indirectly from broader behavioral data. That means even seemingly harmless conversations, interests, or interaction patterns could contribute to detailed profiling over time.\u003C\u002Fp\u003E\u003Ch2 id=\"why-meta-may-be-stepping-back-from-encryption\"\u003EWhy Meta may be stepping back from encryption\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe change may, in part, be tied to safety and moderation challenges. Encrypted systems make it much harder for platforms to detect scams, abusive material, harassment, or other policy violations because message content cannot be read server-side.\u003C\u002Fp\u003E\u003Cp\u003EThe company has also faced regulatory pressure around child safety and content moderation.\u003C\u002Fp\u003E\u003Ch2 id=\"privacy-at-stake\"\u003EPrivacy at stake?\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe combination of weaker privacy and AI-driven personalization, some may argue, could reflect an industry trend. Social platforms increasingly rely on AI systems trained on massive volumes of user interaction data to improve engagement and performance.\u003C\u002Fp\u003E\u003Cp\u003EFor users, the practical impact is that conversations, behavioral patterns, and interactions may become more valuable inputs into recommendation and monetization systems.\u003C\u002Fp\u003E\u003Cp\u003ERemoving E2EE increases the potential exposure surface for sensitive communications in the context of AI training (profiling), account compromise, or a data breach.\u003C\u002Fp\u003E\u003Ch2 id=\"what-instagram-users-should-do-now\"\u003EWhat Instagram users should do now\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf you’re concerned about privacy, reconsider what information you share through Instagram DMs. Here are some practical steps:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EAvoid sharing sensitive personal or financial information over Instagram\u003C\u002Fli\u003E\u003Cli\u003EFor super private conversations, lean toward apps with default end-to-end encryption\u003C\u002Fli\u003E\u003Cli\u003EReview Meta privacy and ad preference settings regularly\u003C\u002Fli\u003E\u003Cli\u003EDownload old encrypted chat archives if needed\u003C\u002Fli\u003E\u003Cli\u003EBe cautious about what you share with AI chatbots and assistants\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAs a rule of thumb, keep in mind that your social media interactions may (and often do) contribute to personalization models.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also like to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffake-whatsapp-clone-spyware-meta\"\u003E\u003Cstrong\u003E\u003Cem\u003EFake WhatsApp Clone Used in Spyware Campaign, Meta Warns\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fsocial-media-scams-2-1-billion-2025-ftc\"\u003E\u003Cstrong\u003E\u003Cem\u003ESocial Media Scams Cost Americans $2.1 Billion in 2025, FTC Warns\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fthe-online-safety-act-is-changing-the-internet-for-kids-but-families-say-its-still-not-enough\"\u003E\u003Cstrong\u003E\u003Cem\u003EThe Online Safety Act Is Changing the Internet for Kids — But Families Say It’s Still Not Enough\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:w,name:t,slug:x,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"Instagram parent company Meta has quietly abandoned encrypted direct messages on the popular social media platform, marking a reversal in the company’s push toward privacy-centric messaging.\n\nAs of May 8, Instagram users can no longer send end-to-end encrypted DMs, according to updated support documentation. The decision comes less than a year after Meta disclosed plans to use conversations with its AI assistant to personalize ads and content recommendations across Facebook and Instagram.\n\n\nKey ",reading_time:y,url:"\u002Fblog\u002Fhotforsecurity\u002Finstagram-drops-encrypted-dms\u002F"},{id:"69fa10e92fa53a9f2eef6d23",title:"Instructure confirms breach; millions of Canvas users potentially impacted",slug:"canvas-data-breach-2026",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstructure-confirms-breach--millions-of-Canvas-users-potentially-impacted.png",featured:c,published_at:"2026-05-05T18:56:05.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EInstructure, the company behind the Canvas learning management system, has confirmed a data breach after a well-known cybercrime group claimed responsibility for stealing data linked to hundreds of millions of users.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003ECanvas owner Instructure confirmed a security incident after the ShinyHunters group claimed responsibility\u003C\u002Fli\u003E\u003Cli\u003EUp to 275 million users may be affected, with exposed data including names, emails, IDs, and messages\u003C\u002Fli\u003E\u003Cli\u003EUsers should watch for scams and suspicious messages, even if they haven’t received an official notification yet\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"the-security-incident-and-exposed-data\"\u003EThe security incident and exposed data\u003C\u002Fh2\u003E\u003Cp\u003ESchools, universities, and other organizations use Canvas to manage coursework, communication, and student records, making it a particularly attractive target for attackers.\u003C\u002Fp\u003E\u003Cp\u003EThe breach came to light after the \u003Cstrong\u003EShinyHunters\u003C\u002Fstrong\u003E extortion group listed Instructure on its leak site, claiming it had stolen data from the company’s systems. According to Bleeping Computer, the breach could affect up to \u003Cstrong\u003E275 million individuals across nearly 9,000 schools worldwide\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003EInstructure confirmed the cybersecurity incident on May 2\u003Csup\u003E \u003C\u002Fsup\u003Eon their official website.\u003C\u002Fp\u003E\u003Cp\u003E“We are providing an update on the security incident we advised you of yesterday. While our investigation continues alongside our outside forensics experts, at this stage we believe the incident has been contained,” the company\u003Ca href=\"https:\u002F\u002Fstatus.instructure.com\u002F\" rel=\"noreferrer\"\u003E said\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ESo far, Instructure says the exposed information only includes names, email addresses, student ID numbers and messages between users.\u003C\u002Fp\u003E\u003Cp\u003EThe company said there is \u003Cstrong\u003Eno evidence (for now)\u003C\u002Fstrong\u003E that highly sensitive data such as passwords, financial details, or government identifiers were compromised.\u003C\u002Fp\u003E\u003Cp\u003E“While we continue actively investigating, thus far, indications are that the information involved consists of certain identifying information of users at affected institutions, such as names, email addresses, and student ID numbers, as well as messages among users,” Instructure explained. “At this time, we have found no evidence that passwords, dates of birth, government identifiers, or financial information were involved. If that changes, we will notify any impacted institutions. “\u003C\u002Fp\u003E\u003Ch2 id=\"what-has-instructure-done-so-far\"\u003EWhat has Instructure done so far?\u003C\u002Fh2\u003E\u003Cp\u003EIn response to the incident, Instructure says it has:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDeployed security patches\u003C\u002Fli\u003E\u003Cli\u003EIncreased system monitoring\u003C\u002Fli\u003E\u003Cli\u003ERotated application keys\u003C\u002Fli\u003E\u003Cli\u003ERequired customers to reauthorize API access\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThe company is also working with cybersecurity experts and law enforcement as the investigation continues.\u003C\u002Fp\u003E\u003Ch2 id=\"what-should-users-do-now\"\u003EWhat should users do now?\u003C\u002Fh2\u003E\u003Cp\u003EEven if the full scope of the breach remains unclear, users and institutions should act with caution and proactively.\u003C\u002Fp\u003E\u003Cp\u003EHere are a few immediate steps worth taking:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ECheck if your institution has issued a notice\u003C\u002Fstrong\u003E\u003Cbr\u003EUniversities and schools are typically responsible for notifying affected users.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBe mindful of suspicious messages\u003C\u002Fstrong\u003E\u003Cbr\u003EExposed email addresses can quickly be used in targeted scams, crafting messages that appear to come from your school, teachers, or classmates. These messages may reference real classes, conversations, or deadlines to feel more convincing. Be cautious about any unexpected requests, especially if they ask you to click links, download files, or share sensitive information. If something seems unusual, verify it independently by contacting the sender through an official channel, not by replying directly to the message.\u003Cbr\u003EAdditionally, you can double-check it with \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E, our free scam detector. For links, use the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E to see if a URL is safe before clicking.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUpdate passwords (even if not exposed)\u003C\u002Fstrong\u003E\u003Cbr\u003EIt’s a good precaution, especially if you reuse passwords across platforms.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMonitor your digital footprint\u003C\u002Fstrong\u003E\u003Cbr\u003EServices like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\" rel=\"noreferrer\"\u003EBitdefender Digital Identity Protection\u003C\u002Fa\u003E help track whether your data appears in known data breaches and alert you early if your information is exposed. It continuously monitors your digital footprint, including email addresses and other personal data, and notifies you if it shows up in newly leaked databases. This kind of early warning allows you to be proactive in changing your passwords, securing accounts, and reducing the risk of follow-up attacks like phishing or identity theft.\u003C\u002Fp\u003E",tags:[{id:"66f50fb228045a04f10ce9b3",name:"Data Breach",slug:"data-breach",description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:w,name:t,slug:x,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:C,name:D,slug:E,profile_image:F,cover_image:a,bio:G,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"Instructure, the company behind the Canvas learning management system, has confirmed a data breach after a well-known cybercrime group claimed responsibility for stealing data linked to hundreds of millions of users.\n\n\nKey takeaways\n\n * Canvas owner Instructure confirmed a security incident after the ShinyHunters group claimed responsibility\n * Up to 275 million users may be affected, with exposed data including names, emails, IDs, and messages\n * Users should watch for scams and suspicious mess",reading_time:2,url:"\u002Fblog\u002Fhotforsecurity\u002Fcanvas-data-breach-2026\u002F"}],tagWhiteDetail:{slug:j,id:h,name:i,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a,url:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Ftag\u002Findustry-news\u002F"},tagBlackDetail:{slug:x,id:w,name:t,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a,url:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Ftag\u002Fdigital-privacy\u002F"},settings:{title:af,description:aW,logo:aX,icon:a,accent_color:aY,cover_image:aZ,facebook:a_,twitter:a$,lang:d,locale:d,timezone:ba,codeinjection_head:a,codeinjection_foot:a,navigation:[{label:bb,url:ag},{label:bc,url:bd},{label:t,url:be},{label:H,url:bf},{label:bg,url:bh},{label:B,url:bi}],secondary_navigation:[],meta_title:a,meta_description:a,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,members_support_address:bj,members_enabled:c,allow_self_signup:c,members_invite_only:c,paid_members_enabled:c,firstpromoter_account:a,portal_button_style:bk,portal_button_signup_text:bl,portal_button_icon:a,portal_signup_terms_html:a,portal_signup_checkbox_required:c,portal_plans:[bm,bn,W],portal_default_plan:W,portal_name:v,portal_button:c,comments_enabled:bo,recommendations_enabled:c,outbound_link_tagging:c,default_email_address:bp,support_email_address:bq,editor_default_email_recipients:br,labs:{},url:bs,version:bt},allBiTags:[]}],fetch:{"BlogMenu:0":{settings:{title:af,description:aW,logo:aX,icon:a,accent_color:aY,cover_image:aZ,facebook:a_,twitter:a$,lang:d,locale:d,timezone:ba,codeinjection_head:a,codeinjection_foot:a,navigation:[{label:bb,url:ag},{label:bc,url:bd},{label:t,url:be},{label:H,url:bf},{label:bg,url:bh},{label:B,url:bi}],secondary_navigation:[],meta_title:a,meta_description:a,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,members_support_address:bj,members_enabled:c,allow_self_signup:c,members_invite_only:c,paid_members_enabled:c,firstpromoter_account:a,portal_button_style:bk,portal_button_signup_text:bl,portal_button_icon:a,portal_signup_terms_html:a,portal_signup_checkbox_required:c,portal_plans:[bm,bn,W],portal_default_plan:W,portal_name:v,portal_button:c,comments_enabled:bo,recommendations_enabled:c,outbound_link_tagging:c,default_email_address:bp,support_email_address:bq,editor_default_email_recipients:br,labs:{},url:bs,version:bt},blogNames:bu,blogTitles:{hotforsecurity:af,labs:"Labs",businessinsights:"Business Insights",cyberpedia:"Cyberpedia"},blogRegions:{hotforsecurity:[d,"ro","de",bv,"es"],labs:[d],businessinsights:[d,bv],cyberpedia:[d]},activeBlog:ah,blogFound:ah},"FilterSection:0":{posts:[{id:aA,title:aB,slug:aC,feature_image:aD,featured:c,published_at:aE,custom_excerpt:a,html:aF,authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:aG,reading_time:V,url:aH},{id:"6a0d608b2fa53a9f2eef7800",title:"Amazon recall scams are on the rise. Here’s how to stay safe.",slug:"amazon-recall-scams",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Famazon-recall-scams.png",featured:c,published_at:"2026-05-20T10:46:08.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EIf you recently ordered something from Amazon and suddenly received a text or email warning that your product has been “recalled” or poses a “serious safety risk,” you may have more than the product to worry about.\u003C\u002Fp\u003E\u003Cp\u003ECybercriminals are exploiting consumer trust in Amazon with a growing wave of fake recall and refund scams.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EScammers are impersonating Amazon recall notices\u003C\u002Fstrong\u003E to steal personal and financial information.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAmazon says it does not send recall alerts via text message.\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003EFake messages often seek to pressure victims with urgent language like “Immediate action required” or “Stop using this item immediately.”\u003C\u002Fli\u003E\u003Cli\u003ECybercriminals frequently use shortened phishing links to hide malicious websites.\u003C\u002Fli\u003E\u003Cli\u003ELegitimate Amazon recall notices can be verified through the \u003Cstrong\u003EYour Recalls and Product Safety Alerts\u003C\u002Fstrong\u003E page and the \u003Cstrong\u003EMessage Center\u003C\u002Fstrong\u003E inside your Amazon account.\u003C\u002Fli\u003E\u003Cli\u003ETools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E can help analyze suspicious messages and URLs before you interact with them.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"how-amazon-recall-scams-work\"\u003EHow Amazon recall scams work\u003C\u002Fh2\u003E\u003Cp\u003EThe scam usually starts with an email or SMS message claiming that an item you recently purchased has been recalled due to a safety issue, contamination risk, electrical defect, or injury hazard.\u003C\u002Fp\u003E\u003Cp\u003EThe message often includes:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EA fake refund offer\u003C\u002Fli\u003E\u003Cli\u003EA warning that you must “respond immediately”\u003C\u002Fli\u003E\u003Cli\u003EA link to “verify your account”\u003C\u002Fli\u003E\u003Cli\u003EA request to confirm shipping or banking information\u003C\u002Fli\u003E\u003Cli\u003EA customer support phone number operated by scammers\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ESome phishing pages even mimic Amazon’s branding and login screens to look legitimate.\u003C\u002Fp\u003E\u003Cp\u003EInteracting with these fraudulent messages, whether by entering your credentials or payment card data, may enable scammers to hijack your Amazon account, steal credit card information, or commit identity theft crimes.\u003C\u002Fp\u003E\u003Ch2 id=\"example-of-an-amazon-recall-scam-text\"\u003EExample of an Amazon Recall Scam Text\u003C\u002Fh2\u003E\u003Cp\u003EBitdefender Labs recently observed scam messages mimicking Amazon recall notifications. One example reads:\u003C\u002Fp\u003E\u003Cp\u003E“Amazon Recall Notice: You ordered this item in January 2026. We are recalling product 111-7816197-9631022 for safety reasons. Stop using it and visit [PHISHING LINK] to request a full refund. We apologize for any inconvenience. - Amazon Security Team”\u003C\u002Fp\u003E\u003Cp\u003EAt first glance, the message may look convincing because it references a recent order and includes a refund offer signed by the “Amazon Security Team”\u003C\u002Fp\u003E\u003Cp\u003EBut the goal is to lure you to a phishing page designed to steal credentials or payment details.\u003C\u002Fp\u003E\u003Cp\u003EYou may also want to read:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Famazon-scams\" rel=\"noreferrer\"\u003EHow to spot and protect against the most common Amazon-related scams\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fpinterest-ad-scams-impersonate-amazon-clearance-sales\" rel=\"noreferrer\"\u003EBitdefender Labs warns of Pinterest ad scams impersonating Amazon clearance sales\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"how-to-spot-an-amazon-recall-scam\"\u003EHow to spot an Amazon recall scam\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EThe message mentions refunds or order problems and often includes a product number and safety reasons\u003C\u002Fli\u003E\u003Cli\u003EThe link looks suspicious, with phishing URLs often hidden behind shortened links such as t.co, shorturl.at or is.gd\u003C\u002Fli\u003E\u003Cli\u003EThe texts may come from a random phone number\u003C\u002Fli\u003E\u003Cli\u003EThe messages push you into acting quickly, with phrases like:\u003Cstrong\u003E \u003C\u002Fstrong\u003E“Stop using this product now” , “Claim your refund immediately,” or “Urgent recall action required” designed to send you into a panic\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAmazon specifically warns users to:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBe cautious of messages creating false urgency\u003C\u002Fli\u003E\u003Cli\u003EAvoid clicking suspicious links\u003C\u002Fli\u003E\u003Cli\u003ENever share sensitive information outside Amazon’s official website or app\u003C\u002Fli\u003E\u003Cli\u003EVerify recalls directly through Amazon channels\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAmazon also \u003Ca href=\"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fhelp\u002Fcustomer\u002Fdisplay.html?nodeId=TapjnwRvIRtlgyLPSl\" rel=\"noreferrer\"\u003Enotes\u003C\u002Fa\u003E that:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E“We do not send text messages about recalls.”\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat detail alone can help consumers identify many scams immediately.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-verify-a-real-amazon-recall-notice\"\u003EHow to verify a real Amazon recall notice\u003C\u002Fh2\u003E\u003Cp\u003EIf you receive a suspicious recall notice, don’t panic and don’t click the link right away. You should:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003ELog in to your Amazon account directly. Do this in the Amazon app or type the website manually into the browser.\u003C\u002Fli\u003E\u003Cli\u003ENext, check \u003Cstrong\u003E“Your Recalls and Product Safety Alerts.” \u003C\u002Fstrong\u003EThe company provides an official section dedicated to recalls and safety notices associated with all of your purchases.\u003C\u002Fli\u003E\u003Cli\u003EReview messages in the Amazon Message Center. You should find all\u003Cstrong\u003E l\u003C\u002Fstrong\u003Eegitimate emails sent by Amazon inside your account’s Message Center.\u003C\u002Fli\u003E\u003Cli\u003EContact Amazon Support Directly.\u003Cstrong\u003E \u003C\u002Fstrong\u003EIf you’re still unsure, contact Amazon through official support channels rather than replying to the message.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Ch2 id=\"more-tips-on-how-to-stay-safe-and-avoid-getting-scammed\"\u003EMore tips on how to stay safe and avoid getting scammed\u003C\u002Fh2\u003E\u003Cp\u003E\u003Cstrong\u003EUse free scam detection tools from Bitdefender to verify unexpected Amazon recall messages\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003ETools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E can help analyze suspicious texts, while \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E can inspect URLs before you open them.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EDon’t forget to secure your account\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EUse strong passwords and enable two-factor authentication wherever possible. You can also create stronger passwords using the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpassword-generator\"\u003EBitdefender Password Generator\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EProtect your phone. It’s just as important as protecting your computer. Many phishing campaigns and scam waves now target users primarily through SMS messages, messaging apps, and mobile notifications because attackers know people are more likely to react quickly on a phone.\u003C\u002Fp\u003E\u003Cp\u003EInstalling a trusted mobile security solution for \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fmobile-security-android\" rel=\"noreferrer\"\u003EAndroid\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fmobile-security-ios\" rel=\"noreferrer\"\u003EiOS\u003C\u002Fa\u003E can help detect malicious links, block phishing attempts, and warn you about emerging scam campaigns in your region before they spread widely. Features like Scam Radar provide you with real-time scam wave alerts and help you identify suspicious texts, links, and fraudulent messages before they cause damage.\u003C\u002Fp\u003E\u003Ch2 id=\"faqs\"\u003EFAQs\u003C\u002Fh2\u003E\u003Ch3 id=\"does-amazon-contact-you-if-there-is-a-recall\"\u003EDoes Amazon contact you if there is a recall?\u003C\u002Fh3\u003E\u003Cp\u003EYes. Amazon may notify customers about legitimate recalls associated with products they purchased. However, Amazon says it does not send recall notifications through text messages. Legitimate notices can be verified through the Amazon Message Center and the “Your Recalls and Product Safety Alerts” page inside your account.\u003C\u002Fp\u003E\u003Ch3 id=\"what-are-the-latest-amazon-scams\"\u003EWhat are the latest Amazon scams?\u003C\u002Fh3\u003E\u003Cp\u003ERecent Amazon scams include:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFake recall and refund notices\u003C\u002Fli\u003E\u003Cli\u003EPrime membership renewal scams\u003C\u002Fli\u003E\u003Cli\u003EFake delivery problem texts\u003C\u002Fli\u003E\u003Cli\u003EAccount suspension phishing emails\u003C\u002Fli\u003E\u003Cli\u003EImpersonation phone calls from fake Amazon support\u003C\u002Fli\u003E\u003Cli\u003EBrushing scams involving unordered packages\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EMany of these scams aim to steal login credentials, payment details, or verification codes.\u003C\u002Fp\u003E\u003Ch3 id=\"how-do-i-know-if-an-amazon-message-is-real\"\u003EHow do I know if an Amazon message is real?\u003C\u002Fh3\u003E\u003Cp\u003EA legitimate Amazon message can usually be verified in the Amazon Message Center after you log in to your account. Watch out for messages that use urgent language, contain suspicious links, request sensitive information, or include SMS recall alerts.\u003C\u002Fp\u003E",authors:[{id:C,name:D,slug:E,profile_image:F,cover_image:a,bio:G,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:"If you recently ordered something from Amazon and suddenly received a text or email warning that your product has been “recalled” or poses a “serious safety risk,” you may have more than the product to worry about.\n\nCybercriminals are exploiting consumer trust in Amazon with a growing wave of fake recall and refund scams.\n\n\nKey takeaways\n\n * Scammers are impersonating Amazon recall notices to steal personal and financial information.\n * Amazon says it does not send recall alerts via text message",reading_time:V,url:"\u002Fblog\u002Fhotforsecurity\u002Famazon-recall-scams\u002F"},{id:aI,title:aJ,slug:aK,feature_image:aL,featured:c,published_at:aM,custom_excerpt:a,html:aN,authors:[{id:aO,name:aP,slug:aQ,profile_image:aR,cover_image:a,bio:aS,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:aT,reading_time:y,url:aU},{id:O,title:P,slug:Q,feature_image:R,featured:c,published_at:S,custom_excerpt:a,html:ad,authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:T,reading_time:ae,url:U},{id:Y,title:Z,slug:_,feature_image:$,featured:v,published_at:aa,custom_excerpt:A,html:ab,authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:w,name:t,slug:x,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:A,reading_time:N,url:ac},{id:"6a0c20722fa53a9f2eef76db",title:"Older adults lost billions to scammers last year, FBI warns",slug:"older-adults-lost-billions-to-scammers-2026",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FOlder-adults-lost-billions-to-scammers-last-year--FBI-warns.png",featured:c,published_at:"2026-05-19T12:09:54.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EThe FBI is warning that older adults continue to face growing financial losses from scams, fraud, and cybercrime.\u003C\u002Fp\u003E\u003Cp\u003EAmericans aged 60 and older reported more than $7.7 billion in losses in 2025 alone, the bureau announced last week. Officials say scammers are becoming increasingly sophisticated, using emotional manipulation, impersonation tactics, fake investment opportunities, and even AI-generated content to target victims.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EThe FBI says adults over the age of 60 lost more than $7.7 billion to scams in 2025.\u003C\u002Fli\u003E\u003Cli\u003EInvestment fraud, impersonation scams, and tech support scams remain among the biggest threats.\u003C\u002Fli\u003E\u003Cli\u003ECriminals increasingly use AI-generated content and emotional manipulation to pressure victims.\u003C\u002Fli\u003E\u003Cli\u003EFamilies can help reduce risk through open conversations, scam awareness, and ongoing digital protection.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"real-stories-behind-the-statistics\"\u003EReal stories behind the statistics\u003C\u002Fh2\u003E\u003Cp\u003EDuring an investigation into a fraudulent call center operating out of India, FBI special agent Ron Miller said he identified an older American woman who was being targeted by scammers and lost $500,000&nbsp;in cash, wire transfers,&nbsp;and gift cards.\u003C\u002Fp\u003E\u003Cp\u003EAccording to the FBI, the victim initially ignored calls from investigators and even blocked Miller’s number because she believed the situation was legitimate. After meeting her in person, Miller eventually convinced her she was being scammed.\u003C\u002Fp\u003E\u003Cp\u003E“The victim just broke down emotionally in disbelief after realizing that she had lost her life savings to a scam,” Miller \u003Ca href=\"https:\u002F\u002Fwww.fbi.gov\u002Fnews\u002Fstories\u002Fscammers-target-older-adult-victims\"\u003Esaid\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Ch2 id=\"why-older-adults-are-heavily-targeted\"\u003EWhy older adults are heavily targeted\u003C\u002Fh2\u003E\u003Cp\u003EScammers often target older adults because they believe they may have retirement savings or accumulated wealth, are more likely to answer phone calls or respond to emails, feel isolated or emotionally vulnerable, and are less familiar with rapidly evolving online scam tactics. Criminals frequently tailor their approach to exploit trust, urgency, and emotion rather than relying purely on technical tricks.\u003C\u002Fp\u003E\u003Cp\u003EScammers may pose as:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EA bank employee warning about fraud\u003C\u002Fli\u003E\u003Cli\u003ETechnical support claiming a computer infection\u003C\u002Fli\u003E\u003Cli\u003EA government agency threatening legal action\u003C\u002Fli\u003E\u003Cli\u003EA grandchild or relative in distress\u003C\u002Fli\u003E\u003Cli\u003EA romantic partner asking for financial help\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"the-scams-inflicting-the-biggest-losses\"\u003EThe scams inflicting the biggest losses\u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Flabs\u002Fglobal-investment-scam-network-using-meta-ads\" rel=\"noreferrer\"\u003EInvestment\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-crypto-scams\" rel=\"noreferrer\"\u003Ecryptocurrency scams\u003C\u002Fa\u003E continued to cause some of the biggest financial losses for older adults in 2025. According to the FBI’s Internet Crime Complaint Center (IC3), investment-related fraud led to more than $3.5 billion in reported losses last year alone. Cryptocurrency scams were particularly damaging, affecting more than 42,000 older victims and resulting in $4.3 billion in losses.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fphishing-scams\" rel=\"noreferrer\"\u003EPhishing\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-gb\u002Fblog\u002Fhotforsecurity\u002Fcall-spoofing\" rel=\"noreferrer\"\u003Espoofing\u003C\u002Fa\u003E scams were the most commonly reported frauds targeting seniors in 2025. These scams usually arrive via convincing emails, text messages, or phone calls that appear to come from trusted organizations, banks, delivery companies, or even family members. The goal is to trick victims into sharing passwords, financial details, or other sensitive information. According to the IC3 report, more than 48,000 older adults reported phishing or spoofing scams last year, accounting for nearly a quarter of all complaints submitted by senior victims.\u003C\u002Fp\u003E\u003Cp\u003EGovernment \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffbi-impersonation-scams-send-money\" rel=\"noreferrer\"\u003Eimpersonation scams\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fsecure-your-business-before-going-on-holiday\u002F\" rel=\"noreferrer\"\u003EAI-powered family impersonation scams\u003C\u002Fa\u003E are also becoming more common. Criminals may pretend to be from the IRS, Medicare, or the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-au\u002Fblog\u002Fhotforsecurity\u002Fgovernment-impostor-scams-fraudsters-armed-with-ssns-cold-call-victims-and-coerce-them-into-buying-gold\" rel=\"noreferrer\"\u003ESocial Security Administration\u003C\u002Fa\u003E and contact victims with threats, fake investigations, or urgent requests for money. The FBI says these impersonation scams generated nearly $798 million in reported losses across all age groups in 2025, including more than 8,600 complaints from older adults.\u003C\u002Fp\u003E\u003Cp\u003EYou may also want to read:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fthey-wear-our-faces-how-scammers-are-using-ai-to-swindle-american-families\" rel=\"noreferrer\"\u003EThey Wear Our Faces: How Scammers Are Using AI to Swindle American Families\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fyour-boss-needs-this-asap-how-ai-impersonation-scams-trick-employees\" rel=\"noreferrer\"\u003E‘Your Boss Needs This ASAP!’ How AI Impersonation Scams Trick Employees\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fflorida-woman-loses-15k-to-ai-voice-scam-mimicking-daughter-in-distress\" rel=\"noreferrer\"\u003EFlorida Woman Loses $15K to AI Voice Scam Mimicking Daughter in Distress\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"the-fbi%E2%80%99s-advice-hang-up-and-verify\"\u003EThe FBI’s advice: hang up and verify\u003C\u002Fh2\u003E\u003Cp\u003ERon Miller, special agent with the FBI Washington Field Office, warned that scammers become more effective the longer they keep victims engaged.\u003C\u002Fp\u003E\u003Cp\u003E“The best way to avoid scams is to ignore unsolicited communications, especially calls from unknown numbers,” he said. “The longer scammers talk to victims, the more successful they are with the scam.”\u003C\u002Fp\u003E\u003Cp\u003EThe FBI encourages people to slow down, verify requests independently, and discuss suspicious situations with trusted family members before sending money or sharing information.\u003C\u002Fp\u003E\u003Ch2 id=\"how-families-can-help-protect-older-loved-ones\"\u003EHow families can help protect older loved ones\u003C\u002Fh2\u003E\u003Cp\u003EOne of the strongest defenses against scams is communication.\u003C\u002Fp\u003E\u003Cp\u003EMany victims feel ashamed after being targeted and may avoid discussing suspicious calls or financial activity. Unfortunately, scammers often exploit this silence.\u003C\u002Fp\u003E\u003Cp\u003EFamilies can help by:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ETalking openly about common scams and fraud tactics\u003C\u002Fli\u003E\u003Cli\u003EEncouraging relatives to verify urgent financial requests\u003C\u002Fli\u003E\u003Cli\u003ECreating family “safe words” for emergencies\u003C\u002Fli\u003E\u003Cli\u003EReviewing privacy settings and account security together\u003C\u002Fli\u003E\u003Cli\u003EHelping older relatives identify phishing attempts and fake websites\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EConsider ongoing protection for the whole family\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EScams often spread through families.\u003C\u002Fp\u003E\u003Cp\u003EA \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Ffamily\" rel=\"noreferrer\"\u003EBitdefender Family Plan\u003C\u002Fa\u003E includes tools such as Scam Protection, along with device protection, email security, a Premium VPN, and digital identity monitoring.\u003C\u002Fp\u003E\u003Cp\u003EProtection across multiple devices can help reduce the risk of account takeovers, phishing attempts, and identity misuse, particularly for households supporting older relatives.\u003C\u002Fp\u003E\u003Cp\u003EYou can also use free tools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E to analyze suspicious messages and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E to verify potentially dangerous links before opening them.\u003C\u002Fp\u003E\u003Cp\u003ETake a look at one of our family plans to help keep everyone safer online.\u003C\u002Fp\u003E",authors:[{id:C,name:D,slug:E,profile_image:F,cover_image:a,bio:G,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:"The FBI is warning that older adults continue to face growing financial losses from scams, fraud, and cybercrime.\n\nAmericans aged 60 and older reported more than $7.7 billion in losses in 2025 alone, the bureau announced last week. Officials say scammers are becoming increasingly sophisticated, using emotional manipulation, impersonation tactics, fake investment opportunities, and even AI-generated content to target victims.\n\n\nKey takeaways\n\n * The FBI says adults over the age of 60 lost more th",reading_time:y,url:"\u002Fblog\u002Fhotforsecurity\u002Folder-adults-lost-billions-to-scammers-2026\u002F"}],sidePosts:[{id:O,title:P,slug:Q,feature_image:R,featured:c,published_at:S,custom_excerpt:a,html:ad,authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:T,reading_time:ae,url:U},{id:aj,title:ak,slug:al,feature_image:am,featured:c,published_at:an,custom_excerpt:a,html:"\u003Cp\u003EScammers have been actively exploiting the hype surrounding football tournaments, and the demand for the biggest event of the year could bring devastating financial losses for fans, Lloyds Bank and the UK Home Office warned.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeways\"\u003EKey takeways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003ELloyds bank says football ticket fraud has surged in recent seasons, and experts believe the World Cup could make the fraud problem even worse.\u003C\u002Fli\u003E\u003Cli\u003EFootball ticket scams rose by \u003Cstrong\u003E36% with victims losing an average of\u003C\u002Fstrong\u003E \u003Cstrong\u003E£215\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003EMany scams originated on social media platforms\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAccording to \u003Ca href=\"https:\u002F\u002Fwww.lloydsbankinggroup.com\u002Fmedia\u002Fpress-releases\u002F2026\u002Flloyds\u002Fworld-cup-ticket-scams.html\" rel=\"noreferrer\"\u003ELloyds\u003C\u002Fa\u003E, football-related scams now account for \u003Cstrong\u003E32% of all ticket scams\u003C\u002Fstrong\u003E reported to the bank. &nbsp;The findings are based on thousands of scam cases recorded between October 2025 and March 2026.\u003C\u002Fp\u003E\u003Cp\u003ELloyds also noted that scammers heavily target supporters of high-profile clubs like Arsenal, Liverpool, Chelsea, and Manchester United, as well as major events such as the FA Cup Final and Champions League Final.\u003C\u002Fp\u003E\u003Cp\u003EThe financial institution, alongside the UK government, believes that the same tactics will increase dramatically around the World Cup 2026.\u003C\u002Fp\u003E\u003Ch2 id=\"why-the-world-cup-is-a-massive-opportunity-for-scammers\"\u003EWhy the World Cup is a massive opportunity for scammers \u003C\u002Fh2\u003E\u003Cp\u003EThe 2026 FIFA World Cup is expected to be the largest World Cup ever, with millions of fans traveling internationally across North America.\u003C\u002Fp\u003E\u003Cp\u003EAt the same time, ticket prices have skyrocketed.\u003C\u002Fp\u003E\u003Cp\u003EThe bank warns that these rising costs may push fans toward:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EUnofficial resale platforms\u003C\u002Fli\u003E\u003Cli\u003ESocial media sellers\u003C\u002Fli\u003E\u003Cli\u003E“Exclusive” presale offers\u003C\u002Fli\u003E\u003Cli\u003EFake hospitality packages\u003C\u002Fli\u003E\u003Cli\u003ELast-minute bargain deals\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThat’s exactly where fraudsters operate.\u003C\u002Fp\u003E\u003Cp\u003EThe bank says scammers exploit panic, urgency, and the fear of missing out, especially when fans believe tickets are about to sell out.\u003C\u002Fp\u003E\u003Cp\u003E“As excitement builds for the World Cup, fraudsters are preparing to exploit loyal fans searching for tickets. I urge all football supporters hunting for tickets to Stop! Think Fraud and show fraudsters the red card,” said \u003Cstrong\u003ELord Hanson, \u003C\u002Fstrong\u003EMinister for Fraud at the UK Home Office.\u003C\u002Fp\u003E\u003Ch2 id=\"how-these-ticket-scams-usually-work\"\u003EHow these ticket scams usually work\u003C\u002Fh2\u003E\u003Cp\u003EOne of the most important findings is the role social media plays in ticket fraud. The bank says many football ticket scams begin on social platforms like Facebook and Instagram before moving towards WhatsApp for payment.\u003C\u002Fp\u003E\u003Cp\u003E“Most of the football ticket scams we see start on social media – especially Facebook and Instagram – before the criminal moves the buyer onto WhatsApp and insists on a bank transfer to pay,” Lloyds Fraud Prevention Director Liz Ziegler said. “It’s incredibly convincing, and we don’t want fans to lose their money trying to support their team. We’re urging supporters to stay alert and stick to official ticketing channels.”\u003C\u002Fp\u003E\u003Cp\u003EFraudsters often advertise:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E“Spare tickets”\u003C\u002Fli\u003E\u003Cli\u003EVIP access\u003C\u002Fli\u003E\u003Cli\u003EHospitality bundles\u003C\u002Fli\u003E\u003Cli\u003EWaiting list placements\u003C\u002Fli\u003E\u003Cli\u003EEarly-release offers\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EVictims are then pressured to pay quickly via bank transfer, payment apps, and crypto payments.\u003C\u002Fp\u003E\u003Cp\u003ELloyds also said that fraudsters use counterfeit QR codes, fake ticket screenshots, cloned confirmation emails, AI-generated promotional graphics, and fake customer reviews. Making matters worse, some victims only realize they were scammed after arriving at the stadium gates.\u003C\u002Fp\u003E\u003Ch2 id=\"how-fans-can-stay-safe\"\u003EHow fans can stay safe\u003C\u002Fh2\u003E\u003Cp\u003EWith demand for World Cup tickets expected to intensify, it’s highly recommended to follow a few key safety rules.\u003C\u002Fp\u003E\u003Ch3 id=\"buy-only-from-official-sources\"\u003EBuy only from official sources\u003C\u002Fh3\u003E\u003Cp\u003EWhenever possible, buy tickets directly from FIFA or authorized resale platforms.\u003C\u002Fp\u003E\u003Ch3 id=\"avoid-bank-transfers\"\u003EAvoid bank transfers\u003C\u002Fh3\u003E\u003Cp\u003EBank transfers are among scammers’ preferred payment methods because recovering the money is extremely difficult.\u003C\u002Fp\u003E\u003Ch3 id=\"be-suspicious-of-%E2%80%98too-good-to-be-true%E2%80%99-offers\"\u003EBe suspicious of ‘too-good-to-be-true’ offers\u003C\u002Fh3\u003E\u003Cp\u003ECheap final tickets, exclusive access claims, or urgent “limited time” offers should raise red flags.\u003C\u002Fp\u003E\u003Ch3 id=\"verify-urls-carefully\"\u003EVerify URLs carefully\u003C\u002Fh3\u003E\u003Cp\u003EScammers often create websites that closely mimic official FIFA branding and ticket pages.\u003C\u002Fp\u003E\u003Ch3 id=\"don%E2%80%99t-trust-screenshots-alone\"\u003EDon’t trust screenshots alone\u003C\u002Fh3\u003E\u003Cp\u003EFake QR codes and edited confirmations are increasingly common.\u003C\u002Fp\u003E\u003Ch3 id=\"watch-for-pressure-tactics\"\u003EWatch for pressure tactics\u003C\u002Fh3\u003E\u003Cp\u003EUrgency is a key scam indicator. If someone pressures you to pay immediately, slow down.\u003C\u002Fp\u003E\u003Ch3 id=\"use-free-scam-detection-tools-before-clicking\"\u003EUse free scam detection tools before clicking\u003C\u002Fh3\u003E\u003Cp\u003ETools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E can help analyze suspicious messages, links, and websites before you enter personal or payment information.\u003C\u002Fp\u003E\u003Ch3 id=\"don%E2%80%99t-forget-to-protect-your-mobile-device\"\u003EDon’t forget to protect your mobile device\u003C\u002Fh3\u003E\u003Cp\u003EMost ticket scams start on your phone through social media and messaging apps. Installing a mobile security solution (for \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fmobile-security-android\" rel=\"noreferrer\"\u003EAndroid\u003C\u002Fa\u003E or \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fmobile-security-ios\" rel=\"noreferrer\"\u003EiOS\u003C\u002Fa\u003E) with scam protection can help block malicious links, phishing attempts, and fraudulent pages before you even interact with them.\u003C\u002Fp\u003E",authors:[{id:C,name:D,slug:E,profile_image:F,cover_image:a,bio:G,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:k,name:l,slug:m,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:ao,reading_time:y,url:ap},{id:aq,title:ar,slug:as,feature_image:at,featured:c,published_at:au,custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003EFor years, texting between iPhones and Android devices came with a stubborn privacy gap. Messages sent through Apple’s iMessage system were encrypted. Google Messages chats between Android users could also be encrypted. But once a conversation crossed the “blue bubble vs. green bubble” divide, those protections largely disappeared. That is finally starting to change.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EApple announced that end-to-end encrypted (E2EE) RCS messaging is now rolling out in beta through iOS 26.5, developed in collaboration with Google and the GSMA, the organization behind the RCS standard. The update brings a major privacy upgrade to cross-platform texting.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003EApple and Google are rolling out end-to-end encrypted RCS messaging between iPhones and Android devices.\u003C\u002Fli\u003E\n\u003Cli\u003EMessages protected with E2EE can’t be read by Apple, Google, carriers, or hackers intercepting traffic.\u003C\u002Fli\u003E\n\u003Cli\u003EThe feature is rolling out in beta and depends on carrier support.\u003C\u002Fli\u003E\n\u003Cli\u003EUsers will need updated software and compatible messaging apps to benefit.\u003C\u002Fli\u003E\n\u003Cli\u003EEncryption only works when both sides support the new standard.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"what-is-rcs-and-why-it-matters\"\u003EWhat is RCS and why it matters\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ERich Communication Services (RCS) is a communication protocol standard for instant messaging developed and defined by the GSM Association (GSMA). It’s the modern successor of SMS and MMS on cellular networks with more modern features including high-resolution image and video support, typing indicators, file sharing, and improved group chat functionality, among other things.\u003C\u002Fp\u003E\u003Cp\u003ETraditional SMS text messaging is decades old and notoriously insecure. Even modern RCS messaging lacked full encryption in many iPhone-to-Android chats, which meant messages could potentially be exposed during transmission.\u003C\u002Fp\u003E\u003Cp\u003EThe new system changes that. By using end-to-end encryption, it ensures only the sender and intended recipient can read the messages.\u003C\u002Fp\u003E\u003Cp\u003EIn practical terms, this helps protect:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPrivate conversations\u003C\u002Fli\u003E\u003Cli\u003EShared photos and videos\u003C\u002Fli\u003E\u003Cli\u003ESensitive personal information\u003C\u002Fli\u003E\u003Cli\u003EVerification codes and login details\u003C\u002Fli\u003E\u003Cli\u003EFinancial or medical discussions\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EIt also reduces risks from network interception, rogue Wi-Fi attacks, and certain forms of carrier-level surveillance.\u003C\u002Fp\u003E\u003Cp\u003EThe move is especially significant because cross-platform texting has historically been the weak link in mainstream messaging security.\u003C\u002Fp\u003E\u003Cp\u003EFrom Apple’s May 11 \u003Ca href=\"https:\u002F\u002Fwww.apple.com\u002Fnewsroom\u002F2026\u002F05\u002Fend-to-end-encrypted-rcs-messaging-begins-rolling-out-today-in-beta\u002F\"\u003Eannouncement\u003C\u002Fa\u003E:\u003C\u002Fp\u003E\u003Cblockquote\u003EApple and Google have led a cross-industry effort to bring end-to-end encryption to Rich Communication Services (RCS), making the cross-platform messaging format that replaces traditional SMS more secure and private.\u003C\u002Fblockquote\u003E\u003Cblockquote\u003EStarting today, end-to-end encrypted RCS messaging begins rolling out in beta for iPhone users running iOS 26.5 with&nbsp;\u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F109526\"\u003Esupported carriers\u003C\u002Fa\u003E&nbsp;and Android users on the latest version of Google Messages. When RCS messages are end-to-end encrypted, they can’t be read while they’re sent between devices. Users will know that a conversation is end-to-end encrypted when they see a new lock icon in their RCS chats. Encryption is on by default and will be automatically enabled over time for new and existing RCS conversations.\u003C\u002Fblockquote\u003E\u003Ch2 id=\"what-consumers-will-notice\"\u003EWhat consumers will notice\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EFor most users, the biggest difference may simply be peace of mind. Encrypted RCS chats still look and feel like regular modern messaging experiences, including support for:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EHigh-quality media sharing\u003C\u002Fli\u003E\u003Cli\u003ERead receipts\u003C\u002Fli\u003E\u003Cli\u003ETyping indicators\u003C\u002Fli\u003E\u003Cli\u003EGroup messaging\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EBut users may also start seeing visual indicators that a conversation is protected, such as a lock icon or “Encrypted” label.\u003C\u002Fp\u003E\u003Cp\u003EThe rollout is gradual, however. Not every device or carrier supports encrypted RCS yet. The feature currently requires:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EiOS 26.5 on iPhone\u003C\u002Fli\u003E\u003Cli\u003EThe latest Google Messages app on Android\u003C\u002Fli\u003E\u003Cli\u003ECarrier support for the updated RCS profile\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"how-to-activate-end-to-end-encrypted-rcs-messaging-in-ios\"\u003EHow to activate end-to-end encrypted RCS messaging in iOS\u003C\u002Fh2\u003E\u003Cp\u003EIn the Settings app, tap Apps\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ETap Messages\u003C\u002Fli\u003E\u003Cli\u003ETap RCS Messaging\u003C\u002Fli\u003E\u003Cli\u003ETurn End-to-End Encryption (Beta) on or off\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cem\u003E(Starting with iOS 26.5, the feature is on by default)\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FiOS-26.5-update-notes--screenshot-.jpeg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"945\" height=\"2048\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FiOS-26.5-update-notes--screenshot-.jpeg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FiOS-26.5-update-notes--screenshot-.jpeg 945w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003E\u003Cem\u003EApple informs iPhone users that, starting now, iOS supports end-to-end encrypted RCS messaging.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"what-rcs-brings-to-the-table\"\u003EWhat RCS brings to the table\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fsupport.google.com\u002Fmessages\u002Fanswer\u002F13508703?hl=en\"\u003EAccording to\u003C\u002Fa\u003E Google support, when RCS chats is turned on, you can:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EShare high-resolution photos and videos.\u003C\u002Fli\u003E\u003Cli\u003EKnow when someone is typing.\u003C\u002Fli\u003E\u003Cli\u003EGet read receipts, which show when someone has read or received your message. Read receipts also show your contact when you read their message.\u003C\u002Fli\u003E\u003Cli\u003ESend messages over mobile data and Wi-Fi.\u003C\u002Fli\u003E\u003Cli\u003ERename, edit, and remove yourself from group chats.\u003C\u002Fli\u003E\u003Cli\u003EKeep your conversations secure with end-to-end encryption if you are communicating with other Google Messages users.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"not-every-conversation-is-encrypted-yet\"\u003ENot every conversation is encrypted yet\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EConsumers should understand an important limitation: encryption is not guaranteed in every cross-platform chat — at least not yet.\u003C\u002Fp\u003E\u003Cp\u003EBecause the rollout is gradual and depends on carrier compatibility, some conversations may still fall back to unencrypted messaging.\u003C\u002Fp\u003E\u003Cp\u003ESecurity researchers and tech outlets warn users to check for encryption indicators rather than assume every RCS chat is protected.\u003C\u002Fp\u003E\u003Cp\u003EThat means consumers should still be cautious about sending highly sensitive information over text if they are unsure whether encryption is active.\u003C\u002Fp\u003E\u003Ch2 id=\"what-you-should-do-now\"\u003EWhat you should do now\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf you use both iPhone and Android contacts regularly, here are a few simple steps to strengthen your privacy:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUpdate your devices\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EInstall the latest operating system updates:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EiPhone users should update to iOS 26.5\u003C\u002Fli\u003E\u003Cli\u003EAndroid users should update Google Messages and Android software\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EOlder devices or outdated apps may not support encrypted RCS.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ELook for encryption indicators\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EPay attention to lock icons or “Encrypted” labels in conversations. Those indicators confirm the chat is protected with end-to-end encryption.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAvoid SMS fallback when possible\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf encryption is unavailable and a conversation falls back to SMS, messages lose the modern protections and remain vulnerable to interception.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EContinue using secure messaging apps for highly sensitive conversations\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EApps like Signal and WhatsApp still offer mature end-to-end encryption systems with broader cross-platform support and fewer carrier dependencies.\u003C\u002Fp\u003E\u003Cp\u003EIt’s important to note that iOS 26.5 also carries a long list of security fixes, making it all the more important to update your iPhone or iPad. Many of those fixes are also offered to older-generation device models in iOS 18.7.9 and iPadOS 18.7.9, iPadOS 17.7.11, iOS 16.7.16 and iPadOS 16.7.16, and iOS 15.8.8 and iPadOS 15.8.8.\u003C\u002Fp\u003E\u003Cp\u003EMac users also get the security fixes as part of their corresponding OS updates. Visit \u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F100100\"\u003EApple Support\u003C\u002Fa\u003E to see all the updates available from Cupertino this week.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fandroid-quick-share-supports-ios-airdrop-how-to-use-it-securely\"\u003E\u003Cstrong\u003E\u003Cem\u003EAndroid ‘Quick Share’ Now Supports iOS ‘AirDrop’ – Here’s How to Use It Securely\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fapple-google-gemini-siri-privacy-priority\"\u003E\u003Cstrong\u003E\u003Cem\u003EApple Taps Google’s Gemini to Power Siri, Says Privacy Remains a Priority\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fwhich-big-tech-companies-do-you-trust-or-not-we-asked-netizens\"\u003E\u003Cstrong\u003E\u003Cem\u003EWhich Big Tech Companies Do You Trust (or Not)? We Asked Netizens\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E&nbsp;\u003C\u002Fp\u003E",authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:av,name:aw,slug:ax,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:ay,reading_time:V,url:az},{id:"6a021d452fa53a9f2eef7264",title:"ClickFix: When the victims help the hackers",slug:"clickfix-victims-help-hackers",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FChatGPT-Image-May-11--2026--09_21_54-PM.png",featured:v,published_at:"2026-05-11T21:35:20.000+03:00",custom_excerpt:bw,html:"\u003Cp\u003E\u003Cem\u003EIncreasingly, cyberattacks no longer rely on sophisticated malware exploits or zero-day vulnerabilities. Instead, they depend on something far more predictable and much easier to exploit: people making mistakes.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EClickFix campaigns represent one of the clearest examples of this shift. Victims don’t just open an infected attachment or click on dangerous links. Unfortunately, they actively participate in the compromise of their own systems by following the attacker’s instructions.\u003C\u002Fp\u003E\u003Cp\u003EThis tactic shouldn’t work, but that’s not how it’s playing out. The attacks blend fake error messages, fabricated security warnings, CAPTCHA-style verification prompts and social engineering techniques that eventually persuade users to run the malicious commands themselves. Victims believe they are fixing a technical issue, verifying their identity or restoring access to a service.\u003C\u002Fp\u003E\u003Cp\u003EInstead, they hand control of their device to cybercriminals.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\n\u003Cli\u003EClickFix attacks manipulate users into running malicious commands themselves.\u003C\u002Fli\u003E\n\u003Cli\u003EAttackers impersonate security alerts, browser errors, CAPTCHA checks, and software troubleshooting prompts.\u003C\u002Fli\u003E\n\u003Cli\u003EVictims often copy and paste PowerShell or terminal commands directly into their systems.\u003C\u002Fli\u003E\n\u003Cli\u003EThe technique bypasses traditional phishing expectations because users believe they are solving a legitimate problem.\u003C\u002Fli\u003E\n\u003Cli\u003EClickFix campaigns frequently deliver infostealers, ransomware loaders, remote access trojans, and credential theft malware.\u003C\u002Fli\u003E\n\u003Cli\u003EEducation, behavioral detection, and strict execution controls reduce exposure to these attacks.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"what-is-clickfix\"\u003EWhat is ClickFix?\u003C\u002Fh2\u003E\u003Cp\u003EClickFix is a social engineering technique that tricks victims into manually running dangerous commands on their own devices.\u003C\u002Fp\u003E\u003Cp\u003EUnlike traditional phishing attacks, which deliver malware via downloaded files or exploits, ClickFix operations rely on guided interaction. The attacker persuades the victim to follow step-by-step instructions that eventually compromise the system.\u003C\u002Fp\u003E\u003Cp\u003EThe attack usually starts with a fake browser error, a fraudulent CAPTCHA page, a malicious advertisement, or a compromised website displaying an urgent warning. In many cases, the page claims the user must complete a verification step, restore browser compatibility, or fix a security issue before continuing.\u003C\u002Fp\u003E\u003Cp\u003EIn at least one case, developers \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Flabs\u002Ffake-claude-code-google-ads-malware\"\u003Eseeking Claude AI-related instructions and code\u003C\u002Fa\u003E were tricked into running these commands.\u003C\u002Fp\u003E\u003Cp\u003EThe instructions often direct the victim to open PowerShell, launch the Windows Run dialog, then paste a command into Terminal or temporarily disable protections. The commands themselves are typically obfuscated through techniques such as Base64 encoding, remote script execution, PowerShell download cradles or LOLBin (Living Off The Land Binaries, Scripts and Libraries - essentially software that’s already present on the device) abuse.\u003C\u002Fp\u003E\u003Ch2 id=\"why-attackers-love-clickfix-campaigns\"\u003EWhy attackers love ClickFix campaigns\u003C\u002Fh2\u003E\u003Cp\u003EClickFix attacks solve several problems for cybercriminals. Traditional malware delivery faces increasingly effective defenses. For example, email security blocks malicious attachments, browsers warn users about dangerous downloads and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Ftotal-security\"\u003Emodern endpoint protection platforms\u003C\u002Fa\u003E detect suspicious executables more aggressively than ever.\u003C\u002Fp\u003E\u003Cp\u003EClickFix seeks to bypass many of these barriers by tricking users into becoming active participants in the compromise. The victim willingly launches the command, approves the permissions, and ignores the security warning because the process appears legitimate.\u003C\u002Fp\u003E\u003Cp\u003EIn some campaigns, attackers even persuade their victims to disable security solutions by claiming that the solutions will detect false positives.\u003C\u002Fp\u003E\u003Ch2 id=\"how-a-typical-clickfix-attack-works\"\u003EHow a typical ClickFix attack works\u003C\u002Fh2\u003E\u003Cp\u003EAlthough individual campaigns vary, most ClickFix attacks follow a predictable structure.\u003C\u002Fp\u003E\u003Cp\u003EThe victim first lands on a malicious or compromised webpage displaying an urgent message such as “Your browser failed verification,” “Security validation required,” or “\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fclickfix-compromised-wordpress-sites-vidar-stealer-australia\" rel=\"noreferrer\"\u003ECloudflare check failed\u003C\u002Fa\u003E.” The design usually imitates trusted brands or infrastructure providers to reduce suspicion.\u003C\u002Fp\u003E\u003Cp\u003EThese are just a few examples, but the same behavior has been seen in the gaming community. There’s no limit to where this attack might pop up or to the types of messages criminals will choose to use.\u003C\u002Fp\u003E\u003Cp\u003ENext comes the fake troubleshooting process. The user receives instructions that look technical but harmless, often telling them to press Windows + R, open PowerShell, paste a provided command, and press Enter.\u003C\u002Fp\u003E\u003Cp\u003EOnce executed, the command downloads malware that may include credential stealers, remote access trojans, ransomware loaders, persistence mechanisms or cryptocurrency wallet theft tools. Some campaigns remain largely fileless to reduce detection.\u003C\u002Fp\u003E\u003Ch2 id=\"why-victims-comply-with-malicious-instructions\"\u003EWhy victims comply with malicious instructions\u003C\u002Fh2\u003E\u003Cp\u003EThe effectiveness of ClickFix attacks depends on how carefully the social engineering was designed.\u003C\u002Fp\u003E\u003Cp\u003EAttackers often create some sense of urgency by convincing users that access will remain blocked unless they act immediately. They reinforce legitimacy by imitating trusted companies such as Microsoft, Google, Cloudflare, GitHub and many others.\u003C\u002Fp\u003E\u003Cp\u003EVictims also assume they lack the technical expertise to question complex instructions. When a page confidently presents terminal commands or browser troubleshooting steps, most users comply. This is especially true if the user finds those instructions organically by searching for a solution to a particular problem.\u003C\u002Fp\u003E\u003Cp\u003EClickFix campaigns also exploit a type of behavior that people are already familiar with. Users often interact with prompts asking them to restart applications, verify accounts, approve permissions or install updates.\u003C\u002Fp\u003E\u003Cp\u003ETraditional phishing awareness training often focuses on suspicious attachments, malicious downloads, and poorly written scam emails. ClickFix campaigns avoid many of these classic indicators.\u003C\u002Fp\u003E\u003Ch2 id=\"who-is-most-at-risk-from-clickfix-attacks\"\u003EWho is most at risk from ClickFix attacks\u003C\u002Fh2\u003E\u003Cp\u003EClickFix attacks target ordinary internet users just as aggressively as they target organizations.\u003C\u002Fp\u003E\u003Cp\u003EAnyone who browses the web, uses online documents, installs software, accesses cryptocurrency wallets, or relies on cloud-based services can fall victim to these scams.\u003C\u002Fp\u003E\u003Cp\u003ECybercriminals often focus on consumers because home users typically lack enterprise-grade protections and may feel greater pressure to resolve technical problems quickly.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EHere are some examples of possible victims\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\n\u003Cli\u003EPeople who frequently download software, stream content from unofficial platforms, or search for pirated applications often encounter malicious ads and compromised websites that deliver ClickFix prompts.\u003C\u002Fli\u003E\n\u003Cli\u003ECryptocurrency users also remain a favorite target. Attackers commonly disguise fake wallet verification pages, browser synchronization errors or account protection checks to steal wallet credentials and session tokens.\u003C\u002Fli\u003E\n\u003Cli\u003ERemote workers and freelancers face this threat because they rely on browser-based tools, online collaboration platforms and authentication systems that attackers can imitate convincingly.\u003C\u002Fli\u003E\n\u003Cli\u003EEven technically experienced users are vulnerable. Developers, gamers, and advanced users often feel comfortable running commands in Terminal or PowerShell, which lowers suspicion when malicious pages present fake troubleshooting steps.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"which-operating-systems-are-affected\"\u003EWhich operating systems are affected?\u003C\u002Fh2\u003E\u003Cp\u003EClickFix campaigns primarily target Windows users because PowerShell provides attackers with a powerful built-in scripting environment.\u003C\u002Fp\u003E\u003Cp\u003EHowever, the technique is not limited to Windows. Attackers increasingly adapt ClickFix lures for macOS and Linux distributions.\u003C\u002Fp\u003E\u003Cp\u003ESome campaigns adapt instructions to the visitor’s operating system.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe\"\u003EHow to stay safe\u003C\u002Fh2\u003E\u003Cp\u003EFirst of all, users must be wary of following instructions that advise them to run instructions in the terminal or as a RUN command.\u003C\u002Fp\u003E\u003Cp\u003EBehavioral detection plays a critical role because traditional signature-based defenses may miss ClickFix activity. This is where \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fultimate-security\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EBitdefender Ultimate Security\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E \u003C\u002Fstrong\u003Ecomes into play. Users need a security solution that monitors for PowerShell execution, suspicious processes, remote script downloads, unusual command chains and much more.\u003C\u002Fp\u003E\u003Cp\u003EAlso, web filtering and browser isolation technologies can help prevent users from reaching malicious infrastructure in the first place.\u003C\u002Fp\u003E\u003Cp\u003EFinally, enforcing least privilege principles limits the impact of successful compromises. Users should avoid running commands with administrative permissions whenever possible.\u003C\u002Fp\u003E\u003Ch2 id=\"what-individual-users-should-do\"\u003EWhat individual users should do\u003C\u002Fh2\u003E\u003Cp\u003EConsumers can greatly reduce risk by following several simple practices.\u003C\u002Fp\u003E\u003Cul\u003E\n\u003Cli\u003ETreat terminal instructions from websites as suspicious\u003C\u002Fli\u003E\n\u003Cli\u003ELegitimate websites rarely require users to paste commands into PowerShell or Terminal just to access content.\u003C\u002Fli\u003E\n\u003Cli\u003EBe skeptical of fake verification pages. Cloudflare-style verification pages have become a favorite tool for attackers.\u003C\u002Fli\u003E\n\u003Cli\u003EIf a CAPTCHA asks you to execute commands, close the page immediately.\u003C\u002Fli\u003E\n\u003Cli\u003EKeep security software updated\u003C\u002Fli\u003E\n\u003Cli\u003EUse multi-factor authentication\u003C\u002Fli\u003E\n\u003Cli\u003EAlthough session theft can sometimes bypass MFA, it still reduces overall account compromise risk.\u003C\u002Fli\u003E\n\u003Cli\u003EMonitor accounts for unusual activity\u003C\u002Fli\u003E\n\u003Cli\u003EUnexpected login notifications, session resets or password changes may indicate compromise.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\n\u003C!--kg-card-begin: html--\u003E\n\u003Cdiv style=\"background:#F9F9F9; border:1px solid #e5e5e5; border-radius:12px; padding:24px; margin-top:32px;\"\u003E\n\n  \u003Ch2\u003EFAQ\u003C\u002Fh2\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EWhat is a ClickFix attack?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E A ClickFix attack tricks victims into running malicious commands on their own devices under the guise of fixing a problem or completing a verification step.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EWhy are ClickFix attacks dangerous?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Victims willingly perform the malicious action themselves, which helps attackers bypass traditional phishing defenses.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EWhich operating systems are affected?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E ClickFix campaigns mainly target Windows systems, but attackers have also adapted the technique for macOS, Linux, Android and ChromeOS\u002Fbrowser-based environments.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EWhat malware do ClickFix campaigns deliver?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Common payloads include infostealers, remote access trojans (RATs), ransomware loaders, credential stealers and malware that targets cryptocurrency wallets.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EHow can users spot a ClickFix scam?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Warning signs include websites asking users to paste commands into PowerShell or Terminal, fake CAPTCHA pages, urgent browser alerts and suspicious troubleshooting instructions.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EDo legitimate websites ask users to run terminal commands?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Rarely. Most legitimate websites never require users to paste commands into PowerShell or Terminal just to access content or verify an account.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EHow can consumers protect themselves?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Never run commands copied from websites, avoid suspicious verification pages, keep security software updated and stay cautious with browser extensions and downloads.\u003C\u002Fp\u003E\n\n\u003C\u002Fdiv\u003E\n\u003C!--kg-card-end: html--\u003E\n",authors:[{id:"66d5cbea28045a04f10b89df",name:"Silviu STAHIE",slug:"sstahie",profile_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FBD_Silviu_Stahie_Pic3-1.jpeg",cover_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FBD_Silviu_Stahie_Pic3.jpeg",bio:"Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.",website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:"66f50fb228045a04f10ce990",name:bx,slug:by,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:bw,reading_time:6,url:"\u002Fblog\u002Fhotforsecurity\u002Fclickfix-victims-help-hackers\u002F"},{id:"69fde7872fa53a9f2eef6fe1",title:"ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia",slug:"clickfix-compromised-wordpress-sites-vidar-stealer-australia",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fclickfix-vidar-stealer-australia-header.png",featured:c,published_at:"2026-05-08T16:42:19.000+03:00",custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003ECybercriminals are increasingly relying on social engineering instead of traditional exploits, and Australian authorities are warning that a spreading “ClickFix” campaign is a prime example.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThe Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an advisory about an ongoing malware campaign targeting Australian infrastructure and organizations through compromised WordPress websites. The attacks use fake CAPTCHA or Cloudflare verification prompts to trick users into infecting their own systems with Vidar Stealer malware.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003EThe ACSC is warning that threat actors are using compromised WordPress sites to distribute Vidar Stealer malware.\u003C\u002Fli\u003E\n\u003Cli\u003EThe campaign relies on the “ClickFix” social engineering technique, which tricks users into manually executing malicious commands.\u003C\u002Fli\u003E\n\u003Cli\u003EVictims are shown fake Cloudflare or CAPTCHA verification pages that copy malware commands to the clipboard.\u003C\u002Fli\u003E\n\u003Cli\u003EVidar Stealer targets passwords, browser cookies, cryptocurrency wallets, and other sensitive information.\u003C\u002Fli\u003E\n\u003Cli\u003EClickFix campaigns are spreading rapidly because they bypass many traditional security controls by exploiting user trust instead of software vulnerabilities.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"what-is-clickfix\"\u003EWhat is ClickFix?\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fthe-clickfix-scam-infect-your-own-mac\"\u003E\u003Cstrong\u003EClickFix\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E is a relatively new social engineering tactic that has gained traction among cybercriminals over the past two years. Instead of silently exploiting vulnerabilities, attackers persuade users to run malicious commands themselves.\u003C\u002Fp\u003E\u003Cp\u003ETypically, victims encounter a fake verification page masquerading as a CAPTCHA, browser check, or Cloudflare protection screen. The page instructs users to copy and paste a command into Windows Run, PowerShell, or Terminal to “verify” they are human or resolve a supposed technical issue.\u003C\u002Fp\u003E\u003Cp\u003EIn the campaign flagged by the ACSC, attackers compromised legitimate Australian WordPress websites and injected them with malicious JavaScript. Once users visit the sites, they are redirected to fake verification prompts that deliver the malware chain.\u003C\u002Fp\u003E\u003Cp\u003EMicrosoft has warned that ClickFix attacks have become increasingly popular because they rely on “human intervention” rather than traditional malware delivery techniques, helping attackers evade some automated defenses.\u003C\u002Fp\u003E\u003Ch2 id=\"vidar-stealer-remains-a-major-threat\"\u003EVidar Stealer remains a major threat\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe payload delivered in this campaign is Vidar Stealer, a malware-as-a-service (MaaS) information stealer active since 2018.\u003C\u002Fp\u003E\u003Cp\u003EVidar is designed to harvest:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESaved browser credentials\u003C\u002Fli\u003E\u003Cli\u003ESession cookies\u003C\u002Fli\u003E\u003Cli\u003ECryptocurrency wallet data\u003C\u002Fli\u003E\u003Cli\u003EAutofill information\u003C\u002Fli\u003E\u003Cli\u003ESystem details\u003C\u002Fli\u003E\u003Cli\u003EFiles from infected devices\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThe malware is especially dangerous because stolen browser session cookies sometimes let attackers bypass passwords and even multi-factor authentication sessions. Once collected, the data is typically sold on cybercrime marketplaces or used in follow-on attacks.\u003C\u002Fp\u003E\u003Cp\u003EAccording to the ACSC, Vidar tries to reduce forensic traces by deleting its executable after launching and operating primarily in memory. The malware retrieves command-and-control infrastructure through “dead-drop” resolvers hosted on legitimate services such as Telegram bots and Steam profiles.\u003C\u002Fp\u003E\u003Ch2 id=\"compromised-wordpress-sites-are-fueling-the-campaign\"\u003ECompromised WordPress sites are fueling the campaign\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ESecurity researchers have \u003Ca href=\"https:\u002F\u002Fcybernews.com\u002Fsecurity\u002Fhackers-wordpress-clickfix-captcha-infostealer-campaign\u002F\"\u003Eobserved\u003C\u002Fa\u003E a broader global trend involving the weaponization of compromised WordPress sites to deliver ClickFix malware.\u003C\u002Fp\u003E\u003Cp\u003EResearchers said they identified more than 250 infected websites across at least 12 countries, including Australia, the United States, the United Kingdom, Germany, and Canada. Many of the sites belonged to legitimate businesses and organizations, increasing the credibility of the malicious prompts shown to visitors.\u003C\u002Fp\u003E\u003Cp\u003EAttackers may be gaining access through stolen administrator credentials, exposed admin panels, vulnerable plugins, or weak password protections. The scale and automation of the campaign point to an organized criminal operation rather than opportunistic attackers.\u003C\u002Fp\u003E\u003Ch2 id=\"why-these-attacks-work-so-well\"\u003EWhy these attacks work so well\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EClickFix attacks exploit something security tools often struggle to detect: user behavior.\u003C\u002Fp\u003E\u003Cp\u003EInstead of downloading a malicious attachment or exploiting a browser vulnerability, the victim willingly executes the malicious command. That makes the activity look more legitimate and can help attackers bypass security filters and endpoint protections.\u003C\u002Fp\u003E\u003Cp\u003EThe fake CAPTCHA and Cloudflare prompts also capitalize on familiarity. People encounter verification checks constantly online, making the malicious requests appear routine and trustworthy.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe\"\u003EHow to stay safe\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EOrganizations and individuals should treat any website asking them to manually run commands on their systems as a major red flag.\u003C\u002Fp\u003E\u003Cp\u003EWe recommend:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENever copy and run commands from websites you don’t fully trust\u003C\u002Fli\u003E\u003Cli\u003EKeep WordPress installations, plugins, and themes fully updated\u003C\u002Fli\u003E\u003Cli\u003EUse strong, unique passwords and enable multi-factor authentication for admin accounts\u003C\u002Fli\u003E\u003Cli\u003ERestrict PowerShell and scripting tools where possible\u003C\u002Fli\u003E\u003Cli\u003ETrain employees to recognize fake CAPTCHA and verification prompts\u003C\u002Fli\u003E\u003Cli\u003EUse layered security solutions that can detect infostealers and suspicious behavior\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EBecause info-stealing malware is designed to silently harvest credentials and session tokens, early detection is critical. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fsmall-business\u002F\"\u003E\u003Cstrong\u003EA modern security solution\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E with anti-phishing, web protection, and behavioral threat detection can help stop these attacks before sensitive data is compromised.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fthe-clickfix-scam-infect-your-own-mac\"\u003E\u003Cstrong\u003E\u003Cem\u003EThe Scam That Tricks You Into Infecting Your Own Mac\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffour-years-in-prison-for-cybersecurity-pros-turned-ransomware-attackers\" rel=\"noreferrer\"\u003E\u003Cstrong\u003E\u003Cem\u003EFour Years in Prison for Cybersecurity Pros Turned Ransomware Attackers\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffbi-cybercrime-losses-21-billion-2025-ai\"\u003E\u003Cstrong\u003E\u003Cem\u003EFBI: Cybercrime Losses Hit a Record $21 Billion Last Year, Fueled by AI\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E",authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:"66f50fb228045a04f10ce9b5",name:"Very Small Business",slug:"very-small-business",description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:"Cybercriminals are increasingly relying on social engineering instead of traditional exploits, and Australian authorities are warning that a spreading “ClickFix” campaign is a prime example.\n\nThe Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an advisory about an ongoing malware campaign targeting Australian infrastructure and organizations through compromised WordPress websites. The attacks use fake CAPTCHA or Cloudflare verification prompts to trick u",reading_time:y,url:"\u002Fblog\u002Fhotforsecurity\u002Fclickfix-compromised-wordpress-sites-vidar-stealer-australia\u002F"},{id:"69b2b0472fa53a9f2eef4ca3",title:"Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child",slug:"set-up-parent-managed-whatsapp-account-child",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fwhatsap-kids-child-manage-account.jpg",featured:c,published_at:"2026-03-12T15:01:44.000+02:00",custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003EWhatsApp is rolling out a major new feature designed to make the world’s most popular messaging service safer for kids: \u003Cstrong\u003Eparent-managed accounts\u003C\u002Fstrong\u003E.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways:\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003E\n\u003Cp\u003EWhatsApp is formally expanding into the pre-teen space with built-in parental oversight\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EParent-managed accounts are designed with expert and family input\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EParents retain control over privacy and contact permissions, while core protections like end-to-end encryption remain intact\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EAdvanced features such as Channels, AI tools, and Status may be restricted, limiting exposure to broader social features\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EThe rollout is gradual and global, suggesting WhatsApp is testing and refining the feature based on feedback\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"introducing-parent-managed-accounts-on-whatsapp\"\u003EIntroducing parent-managed accounts on WhatsApp\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E“With input from families and experts, we're rolling out new parent-managed accounts that allow parents or guardians to set up WhatsApp for pre-teens, with new controls to limit their WhatsApp experience to messaging and calling,” the Meta-owned company announced this week.\u003C\u002Fp\u003E\u003Cp\u003EParents can now create and oversee a child’s WhatsApp account and control who can message or call their child, which groups they can join, and how privacy settings are configured.\u003C\u002Fp\u003E\u003Cp\u003EDesigned specifically for pre-teens, parent-managed accounts limit a child’s experience to core messaging and calling features while preventing access to advanced features like AI tools, Channels, and Status updates in some configurations.\u003C\u002Fp\u003E\u003Cp\u003EWhatsApp’s move reflects \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Freddit-fined-20-million-children-privacy\"\u003E\u003Cstrong\u003Egrowing industry pressure to improve child safety online\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EHere are the \u003Cstrong\u003Estep-by-step setup guides\u003C\u002Fstrong\u003E for both \u003Cstrong\u003EiPhone\u003C\u002Fstrong\u003E and \u003Cstrong\u003EAndroid\u003C\u002Fstrong\u003E devices on how to enable the feature.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fparent-managed-whatsapp.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"781\" height=\"439\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F03\u002Fparent-managed-whatsapp.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fparent-managed-whatsapp.jpg 781w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003E\u003Cstrong\u003EBefore you begin, make sure you and your child have:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EBoth\u003C\u002Fstrong\u003E devices (parent and child) nearby\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EActive\u003C\u002Fstrong\u003E WhatsApp installed\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EA phone number\u003C\u002Fstrong\u003E dedicated to the child’s account\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"on-iphone-ios\"\u003EOn iPhone (iOS)\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E1.&nbsp;&nbsp;&nbsp;&nbsp; \u003Cstrong\u003EOpen WhatsApp on the parent’s phone\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E2.&nbsp;&nbsp;&nbsp;&nbsp; Go to \u003Cstrong\u003ESettings → Account → Parent-Managed Accounts\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E3.&nbsp;&nbsp;&nbsp;&nbsp; Choose \u003Cstrong\u003ESet up a managed account\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E4.&nbsp;&nbsp;&nbsp;&nbsp; You’ll be prompted to \u003Cstrong\u003Eenter your child’s phone number\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E5.&nbsp;&nbsp;&nbsp;&nbsp; WhatsApp will send a \u003Cstrong\u003Everification code\u003C\u002Fstrong\u003E to that number — enter it to verify\u003C\u002Fp\u003E\u003Cp\u003E6.&nbsp;&nbsp;&nbsp;&nbsp; Follow the on-screen prompts to \u003Cstrong\u003Elink your child’s device\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E7.&nbsp;&nbsp;&nbsp;&nbsp; Once the link is established, you’ll be asked to create a \u003Cstrong\u003Eparent PIN\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E8.&nbsp;&nbsp;&nbsp;&nbsp; Confirm who can contact your child and set privacy choices\u003C\u002Fp\u003E\u003Ch2 id=\"on-android\"\u003EOn Android\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E1.&nbsp;&nbsp;&nbsp;&nbsp; Launch WhatsApp on your device\u003C\u002Fp\u003E\u003Cp\u003E2.&nbsp;&nbsp;&nbsp;&nbsp; Navigate to \u003Cstrong\u003ESettings → Account → Parent-Managed Accounts\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E3.&nbsp;&nbsp;&nbsp;&nbsp; Tap \u003Cstrong\u003ECreate a managed account for a child\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E4.&nbsp;&nbsp;&nbsp;&nbsp; Enter your child’s phone number and complete the \u003Cstrong\u003Everification step\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E5.&nbsp;&nbsp;&nbsp;&nbsp; Follow the prompts to \u003Cstrong\u003Epair with your child’s phone\u003C\u002Fstrong\u003E using the QR code or PIN flow\u003C\u002Fp\u003E\u003Cp\u003E6.&nbsp;&nbsp;&nbsp;&nbsp; Set up a \u003Cstrong\u003Eparent PIN\u003C\u002Fstrong\u003E for managing settings\u003C\u002Fp\u003E\u003Cp\u003E7.&nbsp;&nbsp;&nbsp;&nbsp; Customize contact permissions, group controls, and privacy filters\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E(\u003Cstrong\u003ENote:\u003C\u002Fstrong\u003E These steps are based on published help content from \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Ffaq.whatsapp.com\u002F875902238256170\u002F\"\u003E\u003Cem\u003EWhatsApp\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E — exact labels may vary depending on app version or region.)\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"tips-for-parents-after-setup\"\u003ETips for parents after setup\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EOnce your child’s account is linked, consider these best practices:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EReview privacy settings periodically\u003C\u002Fstrong\u003E to ensure they still match your family’s comfort level\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ELimit group chats\u003C\u002Fstrong\u003E to only trusted contacts\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETeach your child about online safety\u003C\u002Fstrong\u003E — including how to recognize suspicious contacts and not to share personal information\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EWhatsApp added during the Wednesday \u003Ca href=\"https:\u002F\u002Fblog.whatsapp.com\u002Fintroducing-parent-managed-accounts-on-whatsapp\"\u003Eannouncement\u003C\u002Fa\u003E that it looks forward to feedback as it gradually rolls out the parent management feature over the coming months, \"so we can continue building WhatsApp to provide the safest and most private way for families to connect.\"\u003C\u002Fp\u003E\u003Cp\u003EA video guide on “\u003Cstrong\u003EParent-managed accounts on WhatsApp”\u003C\u002Fstrong\u003E is also available:\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-embed-card\"\u003E\u003Ciframe width=\"200\" height=\"113\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FTan9jBmKIjI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\" title=\"How to set up &amp; monitor parental controls for parent-managed accounts | WhatsApp\"\u003E\u003C\u002Fiframe\u003E\u003C\u002Ffigure\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"frequently-asked-questions-faq\"\u003EFrequently asked questions (FAQ)\u003C\u002Fh2\u003E\u003Ch3 id=\"can-you-set-up-parental-controls-on-whatsapp\"\u003ECan you set up parental controls on WhatsApp?\u003C\u002Fh3\u003E\u003Cp\u003EWhatsApp does not offer built-in parental controls, but you can increase safety using privacy settings and device-level controls. Parents can restrict who can contact the child, disable profile visibility, and use third-party parental control apps to monitor usage and limit screen time.\u003C\u002Fp\u003E\u003Ch3 id=\"how-to-set-up-bitdefender-parental-control\"\u003EHow to set up Bitdefender parental control?\u003C\u002Fh3\u003E\u003Cp\u003ETo set up Bitdefender Parental Control, install the Bitdefender app on the parent’s device and create a child profile. Then install the Parental Control app on the child’s device, log in with the same account, and link the device. From the dashboard, you can manage screen time, app usage, location tracking, and web filtering.\u003C\u002Fp\u003E\u003Ch3 id=\"how-to-make-your-account-parent-managed\"\u003EHow to make your account parent-managed?\u003C\u002Fh3\u003E\u003Cp\u003ETo make an account parent-managed, you typically need to create or link it through a parental control system such as Google Family Link or Apple Family Sharing. This allows a parent to supervise activity, set restrictions, approve downloads, and manage screen time from their own device.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fkids-bypass-age-verification\"\u003E\u003Cstrong\u003E\u003Cem\u003EHow Kids Bypass Age Verification Online and what Families Can Do About It\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fyoutube-gives-parents-more-control-over-teens-shorts-and-screen-time\"\u003E\u003Cstrong\u003E\u003Cem\u003EYouTube Gives Parents More Control Over Teens’ Shorts and Screen Time\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fchatgpt-now-has-parental-controls-what-parents-can-now-do-and-what-they-cant\"\u003E\u003Cstrong\u003E\u003Cem\u003EChatGPT Now Has Parental Controls: What Parents Can Now Do and What They Can’t\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E",authors:[{id:o,name:p,slug:q,profile_image:r,cover_image:a,bio:s,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:"66f50fb228045a04f10ce987",name:"Family Safety",slug:"family",description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:n,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:"WhatsApp is rolling out a major new feature designed to make the world’s most popular messaging service safer for kids: parent-managed accounts.\n\n\nKey takeaways:\n\n\n * \n   \n   \n   WhatsApp is formally expanding into the pre-teen space with built-in parental oversight\n   \n\n * \n   \n   \n   Parent-managed accounts are designed with expert and family input\n   \n\n * \n   \n   \n   Parents retain control over privacy and contact permissions, while core protections like end-to-end encryption remain intact\n  ",reading_time:y,url:"\u002Fblog\u002Fhotforsecurity\u002Fset-up-parent-managed-whatsapp-account-child\u002F"}],page:1,limit:999,isLoading:c,filterString:u,blogname:bu,menuItems:{hotforsecurity:{en:[{tag:u,name:z},{tag:by,name:bx},{tag:X,name:B},{tag:ai,name:H},{tag:"tips-and-tricks",name:"Tips and Tricks"},{tag:bz,name:bA}],es:[{tag:u,name:z},{tag:"consejos-de-seguridad",name:"Consejos de Seguridad"},{tag:"noticias-de-la-industria",name:"Noticias de la industria"},{tag:"microempresas",name:"Microempresas"},{tag:"actualizaciones-de-productos",name:"Actualizaciones de productos"},{tag:"hogar-inteligente",name:"Hogar Inteligente"},{tag:bz,name:bA}],ro:[{tag:u,name:z},{tag:X,name:B},{tag:ai,name:H}],fr:[{tag:u,name:z},{tag:X,name:B},{tag:"conseils-astuces",name:"Conseils"},{tag:"maison-connectee",name:"Maison Connectée"},{tag:bB,name:"ABC CYBERSÉCURITÉ"}],de:[{tag:u,name:z},{tag:"branchennachrichten",name:"Nachrichten"},{tag:X,name:B},{tag:"tipps-und-tricks",name:"TIPPS"},{tag:ai,name:H},{tag:bB,name:"ABC DER CYBERSICHERHEIT"}]},labs:{en:[{tag:u,name:z},{tag:"antimalware-research",name:"Anti-Malware Research"},{tag:"free-tools",name:"Free Tools"},{tag:"whitepapers",name:"Whitepapers"}]},businessinsights:{en:[{tag:u,name:z},{tag:"enterprise-security",name:"Enterprise Security"},{tag:"cloud-security",name:"Cloud Security"},{tag:"privacy-and-data-protection",name:"Privacy and Data Protection"}]}}}},error:a,state:{lang:d,primaryTag:bC,server:"http:\u002F\u002Flocalhost:3000\u002Fnuxt\u002Fapi",mainTag:bC,locale:"en-us"},serverRendered:v,routePath:"\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002F",config:{pageEnv:"prod",_app:{basePath:ag,assetsPath:"\u002Fnuxt\u002F_nuxt\u002F",cdnURL:a}}}}(null,"public",false,"en","66f50fb228045a04f10ce986","EN","top","66f50fb228045a04f10ce98a","Industry News","industry-news","66f50fb228045a04f10ce9b2","Scam","scam","66f50fb228045a04f10ce992","66d5cbea28045a04f10b89d0","Filip TRUȚĂ","ftruta","http:\u002F\u002F0.gravatar.com\u002Favatar\u002F377aeee1f02a7ae7ac62f20f2f4ce504?s=512&d=mm&r=g","Filip has 17 years of experience in technology journalism. In recent years, he has focused on cybersecurity in his role as a Security Analyst at Bitdefender.","Digital Privacy","all",true,"66f50fb228045a04f10ce985","digital-privacy",3,"All","Learn how Instagram impersonation scams use fake brands, businesses and support accounts to steal logins, money and data.","Product Updates","66d5cbea28045a04f10b89c1","Alina BÎZGĂ","abizga","http:\u002F\u002F2.gravatar.com\u002Favatar\u002F8438d6e3076d0baf471aec1235424fcf?s=512&d=mm&r=g","Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.","Smart Home","66d5cbea28045a04f10b89eb","Vlad CONSTANTINESCU","vlad","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2021\u002F12\u002FVlad.jpg","Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion.\nBefore becoming a Security Analyst, he covered tech and security topics.",7,"6a0c48c32fa53a9f2eef77a3","Scam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region","scam-center-interpol-arrests-mena","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fscam-center.png","2026-05-19T15:10:17.000+03:00","International police agencies are mowing through scam centers.\n\nINTERPOL has announced a “first-of-its-kind cybercrime operation” that has led to 201 arrests. Authorities across the Middle East and North Africa (MENA) have identified a further 382 suspects. The coordinated operation targeted online fraud, financial scams, malware distribution, and digital extortion, as global law enforcement agencies step up efforts to disrupt organized cybercrime at scale.\n\n\nKey takeaways\n\n\n * INTERPOL-led auth","\u002Fblog\u002Fhotforsecurity\u002Fscam-center-interpol-arrests-mena\u002F",4,"yearly","product-updates","6a0c2c062fa53a9f2eef770e","Instagram impersonation scams: Fake brands, businesses and support accounts","instagram-impersonation-scams","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstagram-impersonation-scams.jpg","2026-05-19T12:54:22.000+03:00","\u003Cp\u003E\u003Cem\u003EInstagram impersonation \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-scams\"\u003E\u003Cem\u003Escams\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E use familiar names, logos and support-style messages to make fraud feel legitimate. Fake brand pages and “customer support” profiles can trick users into sharing passwords, payment details or personal information.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EInstagram impersonation scams often use fake brands, businesses and support accounts to steal money, login details or personal data\u003C\u002Fli\u003E\u003Cli\u003EFake Instagram support accounts may claim your profile is at risk, your order has a problem or your prize is waiting\u003C\u002Fli\u003E\u003Cli\u003EBrand impersonation scams can lead to phishing, account takeover, fake payments, identity theft and malicious links\u003C\u002Fli\u003E\u003Cli\u003EAlways verify accounts through official websites, avoid DM support links and report impersonation directly through Instagram or Meta tools\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FHow-Instagram-impersonation-scams-work.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1920\" height=\"1280\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FHow-Instagram-impersonation-scams-work.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F05\u002FHow-Instagram-impersonation-scams-work.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1600\u002F2026\u002F05\u002FHow-Instagram-impersonation-scams-work.jpg 1600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FHow-Instagram-impersonation-scams-work.jpg 1920w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Ch2 id=\"why-instagram-impersonation-scams-work\"\u003EWhy Instagram impersonation scams work\u003C\u002Fh2\u003E\u003Cp\u003EInstagram is a visual platform that users seek for its familiarity. A logo, profile photo, brand color, verified-looking bio or a polished grid can make a fake account seem genuine at a glance. Scammers exploit that feeling of trust by copying brands, small businesses, delivery companies, banks, creators, retailers or even Instagram and Meta support.\u003C\u002Fp\u003E\u003Cp\u003EDespite not being novel, the tactic remains effective. A message from a random account asking for payment details looks suspicious. A message from a known store, airline, marketplace, bank or support team, however, would feel more plausible.\u003C\u002Fp\u003E\u003Cp\u003EThe FTC \u003Ca href=\"https:\u002F\u002Fwww.ftc.gov\u002Fnews-events\u002Fdata-visualizations\u002Fdata-spotlight\u002F2024\u002F04\u002Fimpersonation-scams-not-what-they-used-be\"\u003Ewarned\u003C\u002Fa\u003E that business impersonation scams are among the most common fraud types reported by consumers, with hundreds of thousands of reports each year and combined losses of billions of dollars.\u003C\u002Fp\u003E\u003Cp\u003EOn Instagram, this problem is especially severe because threat actors can combine fake profiles, DMs, comments, ads, cloned websites and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-phishing-fake-login-pages\"\u003Ephishing pages\u003C\u002Fa\u003E into a single convincing chain.\u003C\u002Fp\u003E\u003Ch2 id=\"common-instagram-impersonation-scams\"\u003ECommon Instagram impersonation scams\u003C\u002Fh2\u003E\u003Ch3 id=\"fake-customer-support-accounts\"\u003EFake customer support accounts\u003C\u002Fh3\u003E\u003Cp\u003EOne of the most common scam tools is fake customer support. A scammer creates an account that looks like a brand’s help page and monitors public comments for frustrated customers. If you comment under a real company’s post, saying your order didn’t arrive, your account was locked or your refund is delayed, a fake “support” profile is likely to reply or DM you soon after.\u003C\u002Fp\u003E\u003Cp\u003EThe scammer may ask you to “verify” your identity, provide an order number, click a support link or pay a small fee to resolve the issue. In reality, the goal is to collect personal information, card details or login credentials.\u003C\u002Fp\u003E\u003Ch3 id=\"fake-instagram-or-meta-support\"\u003EFake Instagram or Meta support\u003C\u002Fh3\u003E\u003Cp\u003ESome impersonators pose as staffers from Instagram, Meta, copyright enforcement, verification or account security. They may claim your account violated policy, your verification badge is expiring, your page will be deleted or suspicious activity has been detected.\u003C\u002Fp\u003E\u003Cp\u003EThis type of message is designed to instill panic. They typically include a link to a fake login page that steals your username, password and two-factor authentication (2FA) code. Meta’s own hacked-account \u003Ca href=\"https:\u002F\u002Fwww.meta.com\u002Fhelp\u002Fpolicies\u002F539039418231124\u002F\"\u003Eguidance\u003C\u002Fa\u003E lists warning signs such as changed email addresses or passwords, messages sent without your knowledge and posts or ads you did not create.\u003C\u002Fp\u003E\u003Ch3 id=\"fake-brand-giveaways-and-promotions\"\u003EFake brand giveaways and promotions\u003C\u002Fh3\u003E\u003Cp\u003EScammers also promote \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-giveaway-scams\"\u003Efake giveaways\u003C\u002Fa\u003E, coupons, discounts or sweepstakes. The offer may ask you to follow the page, tag friends, complete a form, pay a shipping fee or enter payment details to claim a prize.\u003C\u002Fp\u003E\u003Cp\u003EThe Better Business Bureau \u003Ca href=\"https:\u002F\u002Fwww.bbb.org\u002Fall\u002Fbbbi\u002Fimpersonation-scams\"\u003Edescribes\u003C\u002Fa\u003E impersonation scams as schemes where fraudsters pose as trusted organizations or people to steal money or personal information. BBB also notes that fake rewards, surveys and order messages are common tactics used to push victims toward malicious links or data theft.\u003C\u002Fp\u003E\u003Ch3 id=\"fake-small-businesses-and-shops\"\u003EFake small businesses and shops\u003C\u002Fh3\u003E\u003Cp\u003ENot every impersonation scam copies a major brand. Some copy small businesses, local shops, handmade sellers or creators. The fake account may use stolen photos, copied captions and a similar handle with an added underscore, extra letter or changed punctuation.\u003C\u002Fp\u003E\u003Cp\u003EVictims may pay for products that never arrive, send deposits for fake services or share personal details through fake order forms. The smaller the real business, the harder it may be for consumers to tell which account is authentic.\u003C\u002Fp\u003E\u003Ch2 id=\"why-impersonation-scams-are-so-dangerous\"\u003EWhy impersonation scams are so dangerous\u003C\u002Fh2\u003E\u003Cp\u003EThe immediate risk is financial loss, but Instagram impersonation scams can also compromise accounts and identities.\u003C\u002Fp\u003E\u003Cp\u003EA fake support account can persuade someone to share a password, recovery code or 2FA code. A fake store can collect card details through a cloned checkout page. A fake brand giveaway can harvest names, phone numbers, addresses and emails for future scams. A fake Meta warning can lock a creator or small business owner out of an account they depend on for income.\u003C\u002Fp\u003E\u003Cp\u003EThe damage can spread beyond the first victim. If scammers take over your Instagram account, they can message your friends, impersonate you, promote \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Finstagram-crypto-scams\"\u003Ecrypto scams\u003C\u002Fa\u003E, run fake giveaways or use your profile to make the next scam look more believable.\u003C\u002Fp\u003E\u003Cp\u003EFor creators, influencers and small businesses, an Instagram account is more than a profile; it can be a storefront, portfolio, support channel and source of income. That makes account takeover especially damaging. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fsecurity-for-creators\"\u003E\u003Cstrong\u003EBitdefender Security for Creators\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E is designed for this kind of risk. It combines protection for creators’ social channels, emails and devices, including 24\u002F7 monitoring for suspicious takeover attempts on Instagram, Facebook and YouTube.\u003C\u002Fp\u003E\u003Cp\u003EFor businesses, reputational harm is significant, as customers may blame the real brand for the fake account, especially if they lost money after interacting with a convincing impersonator. Meta has expanded \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fbusiness\u002Fnews\u002Fupdates-to-brand-rights-protection-scam-ads\"\u003EBrand Rights Protection tools\u003C\u002Fa\u003E to help businesses report issues such as impersonation, trademark misuse, counterfeits and suspected scam ads.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-spot-a-fake-brand-or-support-account-on-instagram\"\u003EHow to spot a fake brand or support account on Instagram\u003C\u002Fh2\u003E\u003Cp\u003EFake accounts are not always immediately obvious, but you may see some dead giveaways. Before you reply to a support DM or a promotion link, slow down, and check the profile carefully.\u003C\u002Fp\u003E\u003Cp\u003ELook for warning signs such as:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EA handle that is slightly different from the real brand name\u003C\u002Fli\u003E\u003Cli\u003EA new or low-activity account with few posts\u003C\u002Fli\u003E\u003Cli\u003EDisabled or limited comments\u003C\u002Fli\u003E\u003Cli\u003EGeneric replies that push you into DMs\u003C\u002Fli\u003E\u003Cli\u003EUrgent warnings about deletion, refunds, prizes or account suspension\u003C\u002Fli\u003E\u003Cli\u003ERequests for passwords, 2FA codes, backup codes or payment details\u003C\u002Fli\u003E\u003Cli\u003ELinks that don’t match the brand’s official website\u003C\u002Fli\u003E\u003Cli\u003EPoor grammar, recycled images or stolen brand assets\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EWhen a suspicious “support” account sends you a DM, don’t rely on instinct alone. A fake refund link, prize message, account-warning screenshot or QR code can be checked before you click, pay or share information. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003E\u003Cstrong\u003EBitdefender Scamio\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, for example, is an AI-powered scam detection tool that can analyze suspicious messages, links, images, QR codes and described scenarios. It gives people a practical way to pause before a fake brand account turns into payment fraud or account takeover.&nbsp;\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FReal-vs-fake-support-on-Instagram.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1080\" height=\"1270\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FReal-vs-fake-support-on-Instagram.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F05\u002FReal-vs-fake-support-on-Instagram.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FReal-vs-fake-support-on-Instagram.jpg 1080w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EA legitimate company should never ask for your Instagram password, 2FA code or recovery code in a DM. If an account claims to be customer support, go to the brand’s official website or app and contact support from there instead of using the link sent on Instagram.\u003C\u002Fp\u003E\u003Ch2 id=\"what-to-do-if-you-have-interacted-with-a-fake-account\"\u003EWhat to do if you have interacted with a fake account\u003C\u002Fh2\u003E\u003Cp\u003EIf you have already clicked a link but did not enter information, close the page and avoid further contact. If you entered your Instagram password, change it immediately and enable 2FA. If you entered payment details, contact your bank or card provider and monitor transactions.\u003C\u002Fp\u003E\u003Cp\u003EIf your Instagram account shows signs of compromise, review the login activity, then remove suspicious connected apps and follow Instagram’s official recovery process. Meta advises hacking victims to secure their accounts by changing passwords and reviewing recent login activity.\u003C\u002Fp\u003E\u003Cp\u003EAfter interacting with a fake business or support account, don’t stop at securing your Instagram account. If you have entered your email address, phone number, address or other personal details, check whether the data has been exposed elsewhere. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\"\u003E\u003Cstrong\u003EBitdefender Digital Identity Protection\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E \u003C\u002Fstrong\u003Ecan help you monitor your digital footprint, check for exposed data, and alert you to breaches as it looks across the surface and Dark Web.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInteracted-with-a-fake-Instagram-account-Do-this-next.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1080\" height=\"1280\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F05\u002FInteracted-with-a-fake-Instagram-account-Do-this-next.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F05\u002FInteracted-with-a-fake-Instagram-account-Do-this-next.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInteracted-with-a-fake-Instagram-account-Do-this-next.jpg 1080w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EYou should also report the impersonator on Instagram. If the fake account is copying your business, brand assets or trademark, document everything, from screenshots to profile URLs, handles, messages, payment requests and any cloned website links.\u003C\u002Fp\u003E\u003Ch2 id=\"conclusion\"\u003EConclusion\u003C\u002Fh2\u003E\u003Cp\u003EInstagram impersonation scams work by piggybacking on trust around names people recognize. A fake logo, familiar brand voice or urgent “support” message could prompt you to lower your guard, turning a seemingly normal Instagram interaction into phishing, payment fraud or account takeover.\u003C\u002Fp\u003E\u003Cp\u003EThe safest response is always to verify before you engage. Do not trust support accounts just because they use familiar logos. Do not click account-warning links sent by DM or otherwise. Do not share passwords, 2FA or recovery codes. Do not share payment details, especially with anyone who contacts you first.\u003C\u002Fp\u003E\u003Ch2 id=\"frequently-asked-questions-faq\"\u003EFrequently asked questions (FAQ)\u003C\u002Fh2\u003E\u003Ch3 id=\"is-impersonation-allowed-on-instagram\"\u003EIs impersonation allowed on Instagram?\u003C\u002Fh3\u003E\u003Cp\u003ENo. Instagram allows parody, fan and commentary accounts in some contexts, but deceptive impersonation is not allowed. Accounts that pose as another person, brand, business or support team in a way that misleads users can be reported for impersonation.\u003C\u002Fp\u003E\u003Ch3 id=\"how-do-you-report-business-impersonation-on-instagram\"\u003EHow do you report business impersonation on Instagram?\u003C\u002Fh3\u003E\u003Cp\u003EOpen the fake profile, tap the three-dot menu, choose the report option and follow the prompts for impersonation or scam activity. If the account misuses a trademark, logo or copyrighted content, the business may also need to use Meta’s intellectual property or \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fbusiness\u002Fnews\u002Fupdates-to-brand-rights-protection-scam-ads\"\u003EBrand Rights Protection\u003C\u002Fa\u003E reporting tools, where available.\u003C\u002Fp\u003E\u003Ch3 id=\"what-can-i-do-if-someone-is-impersonating-my-business\"\u003EWhat can I do if someone is impersonating my business?\u003C\u002Fh3\u003E\u003Cp\u003ECollect evidence before the account disappears or changes: screenshots, profile links, usernames, DMs, payment requests and examples of copied logos or content. Report the account to Instagram, warn others through your verified channels, monitor for copycat accounts and consider trademark or intellectual property reporting if your brand assets are being misused.\u003C\u002Fp\u003E\u003Ch3 id=\"is-it-illegal-pose-as-someone-else-on-instagram\"\u003EIs it illegal pose as someone else on Instagram?\u003C\u002Fh3\u003E\u003Cp\u003EIt depends on the context and jurisdiction, but impersonation can be illegal when it is used to commit fraud, steal money, misuse personal data, misrepresent affiliation with a business or deceive consumers. In the US, the \u003Ca href=\"https:\u002F\u002Fwww.ftc.gov\u002Fnews-events\u002Fnews\u002Fpress-releases\u002F2025\u002F04\u002Fftc-highlights-actions-protect-consumers-impersonation-scams\"\u003EFTC’s Impersonation Rule\u003C\u002Fa\u003E makes it illegal to materially and falsely pose as a business or misrepresent affiliation with a business in commerce.\u003C\u002Fp\u003E","\u002Fblog\u002Fhotforsecurity\u002Finstagram-impersonation-scams\u002F","\u003Cp\u003E\u003Cem\u003EInternational police agencies are mowing through scam centers.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EINTERPOL has announced a “first-of-its-kind cybercrime operation” that has led to 201 arrests. Authorities across the Middle East and North Africa (MENA) have identified a further 382 suspects. The coordinated operation targeted online fraud, financial scams, malware distribution, and digital extortion, as global law enforcement agencies step up efforts to disrupt organized cybercrime at scale.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003EINTERPOL-led authorities across the MENA region arrested 201 suspects tied to cybercrime operations.\u003C\u002Fli\u003E\n\u003Cli\u003EInvestigators seized infrastructure linked to phishing, financial fraud, malware campaigns, and online scams.\u003C\u002Fli\u003E\n\u003Cli\u003EThe operation reflects a broader global trend of coordinated crackdowns on organized scam networks.\u003C\u002Fli\u003E\n\u003Cli\u003ECryptocurrency investment scams, romance fraud, and social media scams continue to generate billions in losses worldwide.\u003C\u002Fli\u003E\n\u003Cli\u003EDespite sweeping crackdowns, cybercriminal groups remain highly adaptable and often re-emerge under new infrastructure.\u003C\u002Fli\u003E\n\u003Cli\u003ECybercitizens are encouraged to use security tools designed to detect scams.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"operation-ramz\"\u003EOperation Ramz\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe operation, described by INTERPOL as the first coordinated cybercrime enforcement campaign of its kind in the MENA region, involved extensive intelligence sharing and collaboration among participating countries.\u003C\u002Fp\u003E\u003Cp\u003E“Thirteen countries from the Middle East and North Africa took part in Operation Ramz (October 2025 – 28 February 2026) which aimed to investigate and disrupt malicious infrastructure, identify and arrest suspects, and prevent future losses,” INTERPOL said in a \u003Ca href=\"https:\u002F\u002Fwww.interpol.int\u002Fen\u002FNews-and-Events\u002FNews\u002F2026\u002F201-arrests-in-first-of-its-kind-cybercrime-operation-in-MENA-region\"\u003Epress release\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EAuthorities reportedly dismantled malicious infrastructure, analyzed digital evidence, and identified suspects connected to a wide range of online criminal activity. The crackdown targeted operations linked to phishing, business email compromise (BEC), ransomware-related activity, and online financial fraud.\u003C\u002Fp\u003E\u003Cp\u003ENearly 8,000 pieces of crucial data and intelligence were disseminated among participating countries to initiate and support investigations.\u003C\u002Fp\u003E\u003Cp\u003EThe arrests come as international law enforcement agencies intensify pressure on cybercriminal ecosystems that increasingly operate across borders, using cryptocurrency payments, encrypted messaging platforms, fake identities, and large-scale scam infrastructures to target victims worldwide.\u003C\u002Fp\u003E\u003Ch2 id=\"operational-highlights\"\u003EOperational highlights\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EINTERPOL shared several operational details illustrating the wide scope of the crackdown.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EIn \u003Cstrong\u003EQatar\u003C\u002Fstrong\u003E, investigators detected \u003Cstrong\u003Ecompromised devices\u003C\u002Fstrong\u003E whose owners were unaware their systems had been hijacked and \u003Cstrong\u003Eused to distribute cyber threats\u003C\u002Fstrong\u003E. Authorities secured the devices and alerted victims so they could strengthen their defenses.\u003C\u002Fli\u003E\u003Cli\u003EIn \u003Cstrong\u003EJordan\u003C\u002Fstrong\u003E, police uncovered a \u003Cstrong\u003Efraudulent investment scheme operating through a fake trading platform\u003C\u002Fstrong\u003E. A police raid found 15 individuals carrying out the scams, but later determined they were trafficking victims who had been lured from Asia with \u003Cstrong\u003Efalse job offers\u003C\u002Fstrong\u003E, had their passports confiscated, and were \u003Cstrong\u003Ecoerced into participating in the fraud\u003C\u002Fstrong\u003E. Two suspected organizers were arrested.\u003C\u002Fli\u003E\u003Cli\u003EAuthorities in \u003Cstrong\u003EOman\u003C\u002Fstrong\u003E identified a \u003Cstrong\u003Evulnerable server\u003C\u002Fstrong\u003E hosted in a private residence that contained \u003Cstrong\u003Esensitive information\u003C\u002Fstrong\u003E and had been \u003Cstrong\u003Ecompromised by malware\u003C\u002Fstrong\u003E. Investigators shut down the system to prevent further abuse.\u003C\u002Fli\u003E\u003Cli\u003EIn \u003Cstrong\u003EAlgeria\u003C\u002Fstrong\u003E, police dismantled a \u003Cstrong\u003Ephishing-as-a-service operation\u003C\u002Fstrong\u003E, seizing servers, devices, and phishing tools used to support cybercrime campaigns. One suspect was arrested.\u003C\u002Fli\u003E\u003Cli\u003EMeanwhile, \u003Cstrong\u003EMoroccan\u003C\u002Fstrong\u003E authorities confiscated computers, phones, and storage devices containing \u003Cstrong\u003Ebanking data and phishing software\u003C\u002Fstrong\u003E. Three individuals are facing judicial proceedings, while additional suspects are under investigation.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"global-cybercrime-crackdowns-are-accelerating\"\u003EGlobal cybercrime crackdowns are accelerating\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Ramz operation in the MENA region follows several high-profile disruptions to international cybercrime over the past year.\u003C\u002Fp\u003E\u003Cp\u003EIn April, \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fglobal-scam-crackdown-crypto-fraud-networks-dismantled\"\u003Ea law enforcement\u003C\u002Fa\u003E effort led by the US Department of Justice, the FBI, Dubai Police, and Chinese authorities resulted in at least 276 arrests linked to cryptocurrency investment fraud networks in multiple countries. Authorities dismantled at least nine scam compounds allegedly used to run large-scale online fraud campaigns targeting victims primarily in the United States.\u003C\u002Fp\u003E\u003Cp\u003EThe investigators say the scam networks relied heavily on social engineering tactics to build emotional trust with victims before persuading them to invest increasing amounts of money into fraudulent cryptocurrency schemes.\u003C\u002Fp\u003E\u003Cp\u003EThese operations—often referred to as “pig butchering” scams—are among the world’s fastest-growing forms of organized online fraud.\u003C\u002Fp\u003E\u003Cp\u003EINTERPOL and regional law enforcement agencies have also increasingly focused on infrastructure-level disruption.\u003C\u002Fp\u003E\u003Cp\u003EIn a separate operation across Asia-Pacific countries, INTERPOL announced the takedown of more than \u003Ca href=\"https:\u002F\u002Fwww.interpol.int\u002FNews-and-Events\u002FNews\u002F2025\u002F20-000-malicious-IPs-and-domains-taken-down-in-INTERPOL-infostealer-crackdown\"\u003E20,000 malicious IP addresses and domains\u003C\u002Fa\u003E tied to infostealer malware campaigns. Authorities seized servers and arrested suspects linked to malware operations used to steal credentials, cryptocurrency wallet information, and financial data.\u003C\u002Fp\u003E\u003Ch2 id=\"romance-scams-and-social-media-fraud-continue-to-surge\"\u003ERomance scams and social media fraud continue to surge\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile authorities are making arrests, consumer losses linked to online scams continue to climb.\u003C\u002Fp\u003E\u003Cp\u003EA recent report from Britain highlighted that \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fbrits-102-million-romance-scams\"\u003E\u003Cstrong\u003Eromance scam victims in the UK lost roughly £102 million in 2025 alone\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, with criminals increasingly using dating platforms and social media to manipulate victims emotionally before requesting money transfers or cryptocurrency payments.\u003C\u002Fp\u003E\u003Cp\u003EAt the same time, data from the U.S. Federal Trade Commission showed \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fsocial-media-scams-2-1-billion-2025-ftc\"\u003E\u003Cstrong\u003EAmericans lost an estimated $2.1 billion to social media scams in 2025\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, making social platforms one of the largest sources of fraud-related losses.\u003C\u002Fp\u003E\u003Cp\u003EThe&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fbitdefender-2025-consumer-cybersecurity-survey\"\u003E\u003Cstrong\u003EBitdefender 2025 Consumer Cybersecurity Survey\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E&nbsp;shows social media is attackers’ preferred scam-delivery system.\u003C\u002Fp\u003E\u003Cp\u003EKey findings from our report:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESocial media is the top scam delivery channel (34%)\u003C\u002Fstrong\u003E, underscoring how deception blends seamlessly into platforms where people spend much of their time.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E7 out of 10 respondents have encountered scams\u003C\u002Fstrong\u003E&nbsp;of some type in the last 12 months.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E1 in 7 consumers fell victim to a scam&nbsp;\u003C\u002Fstrong\u003Ein the past year.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EIn the context of AI, 37% named deepfakes\u003C\u002Fstrong\u003E&nbsp;as their biggest concern.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fchart-1-1.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"600\" height=\"500\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fchart-1-1.jpg 600w\"\u003E\u003C\u002Ffigure\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fchart-2-1.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"600\" height=\"485\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fchart-2-1.jpg 600w\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003ECybercriminals increasingly rely on fake investment opportunities, impersonation, cloned accounts, and fraudulent advertisements distributed through mainstream platforms where users lower their guard.\u003C\u002Fp\u003E\u003Cp\u003EScam operations have evolved into highly organized criminal enterprises. Some groups operate with call-center-style structures, scripted manipulation techniques, multilingual operators, money laundering teams, and dedicated technical infrastructure.\u003C\u002Fp\u003E\u003Ch2 id=\"coordinated-busts\"\u003ECoordinated busts\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ECybercrime investigations are notoriously difficult. Criminal groups often spread infrastructure across multiple countries, rely on cryptocurrency transactions, and rapidly migrate operations when servers or domains are seized. That makes international cooperation critical.\u003C\u002Fp\u003E\u003Cp\u003EOperations coordinated through organizations like INTERPOL allow participating countries to share intelligence, identify overlapping investigations, trace infrastructure, and act in unison against criminal networks.\u003C\u002Fp\u003E\u003Cp\u003EAuthorities hope synchronized enforcement makes it harder for cybercriminal groups to quickly regroup elsewhere. Still, arrests alone are unlikely to eliminate large-scale scam ecosystems.\u003C\u002Fp\u003E\u003Cp\u003EPast crackdowns have shown that fraud networks often rebuild using new domains, fresh social media accounts, alternative messaging platforms, and replacement infrastructure within weeks.\u003C\u002Fp\u003E\u003Cp\u003EThe challenge grows even more complicated as criminals adopt AI-assisted tactics, including \u003Cstrong\u003Edeepfake impersonation, voice cloning, and automated scam messaging\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003ERead: \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fsilent-call-unknown-number-its-a-scam\"\u003E\u003Cstrong\u003E\u003Cem\u003EGot a Silent Call From an Unknown Number? It’s Not Random, It’s a Scam\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003ERead: \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Folder-adults-lost-billions-to-scammers-2026\"\u003E\u003Cstrong\u003E\u003Cem\u003EOlder Adults Lost Billions to Scammers Last Year, FBI Warns\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-protect-yourself-from-sophisticated-scams\"\u003EHow to protect yourself from sophisticated scams\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs online fraud operations continue to expand globally, internet users should exercise caution when interacting with strangers online — especially in conversations involving investments, cryptocurrency, urgent financial requests, or emotional manipulation.\u003C\u002Fp\u003E\u003Cp\u003EHere are some practical tips to reduce your risk:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBe skeptical of investment opportunities promoted through social media, messaging apps or dating platforms.\u003C\u002Fli\u003E\u003Cli\u003ENever send money or cryptocurrency to someone you have not verified independently.\u003C\u002Fli\u003E\u003Cli\u003EWatch for pressure tactics involving urgency, secrecy, or emotional manipulation.\u003C\u002Fli\u003E\u003Cli\u003EEnable multi-factor authentication on important accounts.\u003C\u002Fli\u003E\u003Cli\u003EUse strong, unique passwords and consider a password manager.\u003C\u002Fli\u003E\u003Cli\u003EAvoid downloading attachments or clicking links from unexpected messages.\u003C\u002Fli\u003E\u003Cli\u003EKeep devices and security software updated.\u003C\u002Fli\u003E\u003Cli\u003EResearch companies, trading platforms, and investment offers independently before sending funds.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"use-security-tools-that-detect-scams\"\u003EUse security tools that detect scams\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ESecurity solutions with scam-detection features can help identify phishing links, fraudulent messages, and suspicious websites.\u003C\u002Fp\u003E\u003Cp\u003ETo help people stay ahead of evolving threats, Bitdefender has introduced&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fscam-radar-bitdefender\"\u003E\u003Cstrong\u003EScam Radar\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, a new feature integrated into&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fmobile-security-android\"\u003E\u003Cstrong\u003EBitdefender Mobile Security for Android\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003Eand\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fmobile-security-ios\"\u003E\u003Cstrong\u003EBitdefender Mobile Security for iOS\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E.\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhen in doubt about an unsolicited phone call, text or social media interaction, use&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003E\u003Cstrong\u003EScamio\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, our free scam detector and prevention service. Simply describe your situation and let Scamio guide you to safety.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fglobal-scam-crackdown-crypto-fraud-networks-dismantled\"\u003E\u003Cstrong\u003E\u003Cem\u003EGlobal Scam Crackdown: 276 Arrested, Crypto Fraud Networks Dismantled\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fbrits-102-million-romance-scams\"\u003E\u003Cstrong\u003E\u003Cem\u003EBrits Lost £102 Million to Romance Scams Last Year\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"file:\u002F\u002F\u002FUsers\u002Fadammacbrown\u002FDownloads\u002FSocial%20Media%20Scams%20Cost%20Americans%20$2.1%20Billion%20in%202025,%20FTC%20Warns\"\u003E\u003Cstrong\u003E\u003Cem\u003ESocial Media Scams Cost Americans $2.1 Billion in 2025, FTC Warns\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E",5,"Consumer Insights","\u002F","hotforsecurity","smart-home","6a05860f2fa53a9f2eef739e","Football ticket scams are rising fast, Lloyds Bank warns","football-ticket-scams-lloyds-bank","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FFootball-ticket-scams-are-rising-fast--Lloyds-Bank-warns.jpg","2026-05-14T11:33:18.000+03:00","Scammers have been actively exploiting the hype surrounding football tournaments, and the demand for the biggest event of the year could bring devastating financial losses for fans, Lloyds Bank and the UK Home Office warned.\n\n\nKey takeways\n\n * Lloyds bank says football ticket fraud has surged in recent seasons, and experts believe the World Cup could make the fraud problem even worse.\n * Football ticket scams rose by 36% with victims losing an average of £215\n * Many scams originated on social m","\u002Fblog\u002Fhotforsecurity\u002Ffootball-ticket-scams-lloyds-bank\u002F","6a04802b2fa53a9f2eef7357","iPhone-to-Android Texts Are Finally Encrypted – Here’s What That Means for You","iphone-to-android-texts-encrypted-e2ee","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FiPhone-to-Android-Texts-Are-E2EE-Encrypted--header-.png","2026-05-13T16:52:24.000+03:00","6819dde2a2cf20baf7a3a3fa","Mobile Security","mobile-security","For years, texting between iPhones and Android devices came with a stubborn privacy gap. Messages sent through Apple’s iMessage system were encrypted. Google Messages chats between Android users could also be encrypted. But once a conversation crossed the “blue bubble vs. green bubble” divide, those protections largely disappeared. That is finally starting to change.\n\nApple announced that end-to-end encrypted (E2EE) RCS messaging is now rolling out in beta through iOS 26.5, developed in collabor","\u002Fblog\u002Fhotforsecurity\u002Fiphone-to-android-texts-encrypted-e2ee\u002F","6a0d81d42fa53a9f2eef7837","Crypto ATM Scams Keep Growing as Americans Lose Millions, FBI Warns","crypto-atm-scams-americans-lose-millions-fbi","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fcrypto-atm.png","2026-05-20T12:47:27.000+03:00","\u003Cp\u003E\u003Cem\u003EThe FBI is sounding the alarm on a fast-growing fraud trend involving cryptocurrency kiosks, commonly known as crypto ATMs, after Americans reported massive losses tied to scams that use the machines to collect victims’ money.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EIn a public service announcement, the bureau’s Internet Crime Complaint Center (IC3) released state-level complaint data tied to cryptocurrency kiosks as a supplement to its 2025 annual cybercrime report. The agency says criminals continue to exploit crypto kiosks in impersonation scams, investment fraud, and tech support schemes that pressure victims into sending money through cryptocurrency transactions.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003EThe FBI released new state-level data on cryptocurrency kiosk scams.\u003C\u002Fli\u003E\n\u003Cli\u003ECrypto ATMs are increasingly used in impersonation, investment, and tech support scams.\u003C\u002Fli\u003E\n\u003Cli\u003EOlder adults are disproportionately targeted by crypto-related fraud.\u003C\u002Fli\u003E\n\u003Cli\u003ECriminals often pressure victims to deposit cash into crypto kiosks using urgent or threatening tactics.\u003C\u002Fli\u003E\n\u003Cli\u003EThe FBI urges consumers to independently verify requests and avoid sending cryptocurrency to strangers.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"what-are-crypto-kiosks-and-crypto-kiosk-scams\"\u003EWhat are crypto kiosks (and crypto kiosk scams)?\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ECryptocurrency kiosks are ATM-like terminals that allow users to exchange cash for cryptocurrency. These machines have become a preferred payment channel for scammers because transactions are difficult to reverse and can be transferred quickly across borders.\u003C\u002Fp\u003E\u003Cp\u003EIn crypto kiosk scams, fraudsters typically contact victims by phone, text message, email, or social media. The scammer may impersonate a government agency, bank representative, tech support worker, or investment advisor and instruct the victim to withdraw cash and deposit it into a crypto kiosk.\u003C\u002Fp\u003E\u003Cp\u003EVictims are usually given QR codes or wallet addresses that direct the funds straight to the criminals.\u003C\u002Fp\u003E\u003Ch2 id=\"a-growing-trend\"\u003EA growing trend\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EIC3 data indicates cryptocurrency kiosks are increasingly used for fraud.\u003C\u002Fp\u003E\u003Cp\u003EAccording to the \u003Ca href=\"https:\u002F\u002Fwww.ic3.gov\u002FPSA\u002F2026\u002FPSA260515-2\"\u003Ealert\u003C\u002Fa\u003E, the crime complaint center received more than \u003Cstrong\u003E13,400 reports\u003C\u002Fstrong\u003E involving the use of cryptocurrency kiosks in 2025, with \u003Cstrong\u003Elosses exceeding $388 million\u003C\u002Fstrong\u003E. That’s a 23% increase in complaints from 2024 and \u003Cstrong\u003Ea 58% jump\u003C\u002Fstrong\u003E in losses.\u003C\u002Fp\u003E\u003Cp\u003EMore than half of the complaints were \u003Cstrong\u003Efiled by individuals over the age of 50\u003C\u002Fstrong\u003E, with losses over \u003Cstrong\u003E$302 million\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003EThe complaints show criminals typically gave victims detailed instructions on how to withdraw cash from their bank, how to locate a kiosk, and how to deposit and send funds using the kiosk.\u003C\u002Fp\u003E\u003Ch2 id=\"crypto-scams-continue-to-surge\"\u003ECrypto scams continue to surge\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe new state-level data comes alongside the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffbi-cybercrime-losses-21-billion-2025-ai\"\u003E\u003Cstrong\u003EFBI’s broader 2025 IC3 Annual Report\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, which paints a troubling picture of escalating cyber-enabled fraud.\u003C\u002Fp\u003E\u003Cp\u003EThe agency received more than 1 million complaints in 2025, with \u003Cstrong\u003Ereported losses surpassing $20 billion for the first time\u003C\u002Fstrong\u003E. Investment fraud remained the most financially damaging category, followed by business email compromise and tech support scams. Complaints involving cryptocurrency accounted for billions in reported losses.\u003C\u002Fp\u003E\u003Cp\u003EThe FBI says cyber-enabled fraud now represents the overwhelming majority of financial losses reported to the IC3. Many of these scams increasingly rely on cryptocurrency because the transactions are harder for victims and financial institutions to recover once funds are transferred.\u003C\u002Fp\u003E\u003Ch2 id=\"older-adults-remain-heavily-targeted\"\u003EOlder adults remain heavily targeted\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe FBI has repeatedly warned that older adults are disproportionately affected by cryptocurrency scams.\u003C\u002Fp\u003E\u003Cp\u003EThe IC3’s annual report shows \u003Cstrong\u003Eindividuals aged 60 and older reported the highest financial losses\u003C\u002Fstrong\u003E across all cybercrime categories in 2025, totaling billions of dollars.\u003C\u002Fp\u003E\u003Cp\u003EScammers frequently exploit fear, a sense of urgency, or confusion to manipulate victims into acting quickly. In many cases, criminals claim the victim’s bank account has been compromised, threaten arrest over made-up legal issues, or promise high-return investment opportunities.\u003C\u002Fp\u003E\u003Cp\u003ETech support scams remain particularly dangerous. Fraudsters may pretend to represent well-known technology companies and convince victims their computers or accounts have been hacked. The victim is then instructed to “protect” their funds by converting cash into cryptocurrency through a nearby kiosk.\u003C\u002Fp\u003E\u003Ch2 id=\"why-scammers-like-crypto-kiosks\"\u003EWhy scammers like crypto kiosks\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ECrypto kiosks offer criminals several advantages:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ETransactions are fast and often irreversible.\u003C\u002Fli\u003E\u003Cli\u003EVictims can convert large amounts of cash into cryptocurrency quickly.\u003C\u002Fli\u003E\u003Cli\u003EScammers can operate remotely and anonymously.\u003C\u002Fli\u003E\u003Cli\u003EFunds can be moved across multiple wallets within minutes.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EUnlike traditional bank transfers, cryptocurrency transactions typically lack the fraud protections or recovery mechanisms consumers expect from regulated financial institutions.\u003C\u002Fp\u003E\u003Cp\u003EThe FBI says criminals also coach victims through the process in real time, sometimes staying on the phone while the transaction is completed.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe-from-crypto-scams\"\u003EHow to stay safe from crypto scams\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe FBI recommends consumers take several precautions before sending cryptocurrency or using a crypto kiosk:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENever send cryptocurrency to someone you have only met online.\u003C\u002Fli\u003E\u003Cli\u003EBe skeptical of urgent requests involving money, especially from alleged government agencies or financial institutions.\u003C\u002Fli\u003E\u003Cli\u003EDo not trust callers who claim your accounts are compromised and demand immediate payment.\u003C\u002Fli\u003E\u003Cli\u003EVerify requests independently using official contact information.\u003C\u002Fli\u003E\u003Cli\u003EDiscuss suspicious financial requests with trusted family members or friends.\u003C\u002Fli\u003E\u003Cli\u003ERemember that legitimate businesses and government agencies will not demand payment through cryptocurrency kiosks.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EConsumers who believe they have been targeted are encouraged to report incidents to the FBI’s Internet Crime Complaint Center at IC3.gov.\u003C\u002Fp\u003E\u003Ch2 id=\"the-broader-crypto-fraud-problem\"\u003EThe broader crypto fraud problem\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe FBI’s warning reflects a larger trend in cybercrime: scammers increasingly blend social engineering with emerging financial technologies.\u003C\u002Fp\u003E\u003Cp\u003EOver the past several years, criminals have aggressively turned to cryptocurrency payments because they reduce friction, bypass some traditional fraud controls, and complicate investigations. Fraud campaigns tied to fake investments, romance scams, impersonation fraud, and tech support schemes now routinely include instructions on how to pay in cryptocurrency.\u003C\u002Fp\u003E\u003Cp\u003EAs cryptocurrency kiosks become more common in convenience stores, gas stations, and shopping centers, criminals will continue targeting inexperienced users and vulnerable groups.\u003C\u002Fp\u003E\u003Cp\u003EFor consumers, the safest approach is to slow down, verify independently, and treat any request involving cryptocurrency payments as a red flag.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fscam-center-interpol-arrests-mena\"\u003E\u003Cstrong\u003E\u003Cem\u003EScam Centers Are Feeling the Heat – INTERPOL Makes 201 Arrests in the MENA Region\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffbi-cybercrime-losses-21-billion-2025-ai\"\u003E\u003Cstrong\u003E\u003Cem\u003EFBI: Cybercrime Losses Hit a Record $21 Billion Last Year, Fueled by AI\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Folder-adults-lost-billions-to-scammers-2026\"\u003E\u003Cstrong\u003E\u003Cem\u003EOlder Adults Lost Billions to Scammers Last Year, FBI Warns\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E","The FBI is sounding the alarm on a fast-growing fraud trend involving cryptocurrency kiosks, commonly known as crypto ATMs, after Americans reported massive losses tied to scams that use the machines to collect victims’ money.\n\nIn a public service announcement, the bureau’s Internet Crime Complaint Center (IC3) released state-level complaint data tied to cryptocurrency kiosks as a supplement to its 2025 annual cybercrime report. The agency says criminals continue to exploit crypto kiosks in impe","\u002Fblog\u002Fhotforsecurity\u002Fcrypto-atm-scams-americans-lose-millions-fbi\u002F","6a0d5c652fa53a9f2eef77ee","FBI warns students and staff that ShinyHunters may come knocking after Canvas breach","fbi-shinyhunters-canvas-breach","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fcanvas-fbi.jpeg","2026-05-20T10:02:54.000+03:00","\u003Cp\u003EWhen the FBI puts out a \u003Ca href=\"https:\u002F\u002Fwww.ic3.gov\u002FPSA\u002F2026\u002FPSA260515\"\u003Epublic service announcement\u003C\u002Fa\u003E that deliberately appears to avoid naming the company at the centre of the story, you can usually work out which one it is...\u003C\u002Fp\u003E\u003Cp\u003EOn 15 May 2026, the FBI's Internet Crime Complaint Center (IC3) issued an advisory about the ShinyHunters extortion gang that recently breached \"an online Learning Management System\" used by educational institutions across the United States.\u003C\u002Fp\u003E\u003Cp\u003EThe advisory doesn't say the platform that was hacked was Canvas, and that the company concerned was Instructure.\u003C\u002Fp\u003E\u003Cp\u003EFrankly, it didn't need to. The security breach was not just big news on \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fbusinessinsights\u002Ftechnical-advisory-shinyhunters-breach-instructure-canvas-lms\"\u003Ecybersecurity blogs\u003C\u002Fa\u003E, it made \u003Ca href=\"https:\u002F\u002Fwww.bbc.co.uk\u002Fnews\u002Farticles\u002Fce3pq0136eqo\"\u003Eheadlines\u003C\u002Fa\u003E worldwide.\u003C\u002Fp\u003E\u003Cp\u003EOn 12 May, Instructure \u003Ca href=\"https:\u002F\u002Fwww.instructure.com\u002Fincident_update\"\u003Equietly confirmed\u003C\u002Fa\u003E it had reached \"an agreement\" with the attackers, who apparently had helpfully provided \"digital confirmation of data destruction (shred logs).\"\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Finstructure-update.jpeg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"600\" height=\"453\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Finstructure-update.jpeg 600w\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EIn short, Instructure paid the ransom.\u003C\u002Fp\u003E\u003Cp\u003EThere are a few possible problems with paying an extortion gang and trusting that they will honour the deal. One of the big problems is that it requires you to trust an extortion gang.\u003C\u002Fp\u003E\u003Cp\u003EAnd I supposed that's why the FBI wrote its PSA. It's a polite reminder to everyone (whether they be students, parents, or staff) that their data may still be out there - and that it might be sensible to be braced to the possibility that criminals could prove not to be trustworthy - and start putting the stolen information to work.\u003C\u002Fp\u003E\u003Cp\u003EFor instance, ShinyHunters or their cybercriminal counterparts could use the potentially sensitive personal information to harras innocent parties caught up in the breach through no fault of their own.\u003C\u002Fp\u003E\u003Cp\u003EAs the FBI warns, in an attempt to extort money ShinyHunters \"commonly use harassment strategies, sending threatening text messages and phone calls to victims and their family members, and in some cases, swatting.\"\u003C\u002Fp\u003E\u003Cp\u003EFurthermore, extortionists might falsely claim to have access to compromising information, such as embarrassing photographs or videos of victims.\u003C\u002Fp\u003E\u003Cp\u003EAnd then there is always the possibility of spearphishing campaigns, where hackers can disguise their poisoned messages through the use of stolen student IDs, professors' names, or snippets of private messages that were stolen in the breach.\u003C\u002Fp\u003E\u003Cp\u003EThe FBI advises that victims do not engage with anyone claiming to hold their data for ransom, and wait for official guidance from their educational establishment to learn what details may have been compromised.\u003C\u002Fp\u003E\u003Cp\u003EFurthermore, users are advised to not click on suspicious links or unsolicited attachments, and to enable multi-factor authentication where possible to harden the security of their accounts.\u003C\u002Fp\u003E\u003Cp\u003EEvery successful ransom payment writes a sales pitch for the next attack, and ShinyHunters — already linked to incidents at Ticketmaster, the University of Pennsylvania, Princeton, Harvard, Infinite Campus, and McGraw Hill — will not be stopping any time soon.\u003C\u002Fp\u003E\u003Cp\u003EFor students caught in the middle: assume your data is out there, treat every unexpected message with suspicion, and don't let anyone panic you into paying, clicking, or replying. The criminals are counting on your fear. Don't give it to them.\u003C\u002Fp\u003E\u003Cp\u003EThere is, of course, no certainty that ShinyHunters (or any other criminal) will attempt to exploit the information seized by hackers during the Canvas\u002FInstructure breach - but it would it would be wise to consider the possibility, and ensure that defensive measures are properly adopted.\u003C\u002Fp\u003E\u003Cp\u003EAnd that advice also goes to other \"online learning management systems\" and educational establishments. Having receive a ransom payment for its attack on Canvas, ShinyHunters and other extortion gangs are only likely to be further incentivised to launch similar attacks in future.\u003C\u002Fp\u003E","66d5cbea28045a04f10b89d1","Graham CLULEY","gcluley","http:\u002F\u002F2.gravatar.com\u002Favatar\u002F5fdc27b8b6f6fd69e77aa017a53cceb5?s=512&d=mm&r=g","Graham Cluley is an award-winning security blogger, researcher and public speaker.  He has been working in the computer security industry since the early 1990s.","When the FBI puts out a public service announcement that deliberately appears to avoid naming the company at the centre of the story, you can usually work out which one it is...\n\nOn 15 May 2026, the FBI's Internet Crime Complaint Center (IC3) issued an advisory about the ShinyHunters extortion gang that recently breached \"an online Learning Management System\" used by educational institutions across the United States.\n\nThe advisory doesn't say the platform that was hacked was Canvas, and that the","\u002Fblog\u002Fhotforsecurity\u002Ffbi-shinyhunters-canvas-breach\u002F","Instagram paid follower scams promise quick popularity, instant credibility and effortless growth. However, many “cheap followers” and “real engagement” promises lie fake accounts, phishing pages, stolen credentials and payment traps that exploit Instagram users.","News, views and insights from the Bitdefender experts","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2021\u002F05\u002Fh4s_2x.png","#15171A","https:\u002F\u002Fstatic.ghost.org\u002Fv3.0.0\u002Fimages\u002Fpublication-cover.png","bitdefender","@bitdefender","Europe\u002FAthens","Home","Cybersecurity News","\u002Ftag\u002Fpeople-of-bitdefender\u002Findustry-news\u002F","\u002Ftag\u002Fdigital-privacy\u002F","\u002Ftag\u002Fsmart-home\u002F","How To","\u002Ftag\u002Fhow-to\u002F","\u002Ftag\u002Fproduct-updates\u002F","noreply","icon-and-text","Subscribe","free","monthly","off","hotforsecurity@bitdefender.com","noreply@blogapp.bitdefender.com","disabled","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002F","5.101",{},"fr","Increasingly, cyberattacks no longer rely on sophisticated malware exploits or zero-day vulnerabilities. Instead, they depend on something far more predictable and much easier to exploit: people making mistakes.","Threats","threats","vpn","VPN","abc",""));</script></body></html>