#impostors

[ follow ]
Mental health
fromwww.theguardian.com
1 day ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Information security
fromThe Hacker News
18 hours ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Medicine
fromNature
1 day ago

Scientists invented a fake disease. AI told people it was real

Bixonimania is a fabricated medical condition that highlights the dangers of misinformation in AI-generated health advice.
Psychology
fromSilicon Canals
1 day ago

Psychology says the most damaging people in your life are rarely the obviously cruel ones - they're the ones who were kind just often enough to keep you doubting your own perception - Silicon Canals

Intermittent reinforcement creates confusion and self-doubt, making it difficult for individuals to recognize toxic relationships.
Marketing tech
fromForbes
18 hours ago

4 Ways To Stay Authentic In The Age Of AI

Consumer backlash against AI in advertising stems from a perceived lack of authenticity, not the technology itself.
#ai-fraud
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Relationships
fromSilicon Canals
3 days ago

Most people don't realize that the dishonest people in their lives rarely lie about facts - they lie about their intentions, and that specific distinction is why you keep feeling confused rather than simply hurt - Silicon Canals

Intention lies involve sharing true facts with hidden motives, making them difficult to detect.
fromwww.theguardian.com
3 days ago

Buying a collectible? Beware fakers out to persuade you it's the real deal

Scams involving antiques and collectibles are almost as old as some of the items. But internet sales now mean fraudsters have a much wider audience.
E-Commerce
Parenting
fromSlate Magazine
4 days ago

My Mom Got a Call That I Was in a Horrific Accident. What She Did Next Can't Be Undone.

Scammers exploit emotional vulnerabilities, making it crucial to educate and protect against future scams.
Growth hacking
fromSilicon Canals
5 days ago

The people who look most successful on the outside often have no idea what they're doing - they just learned early that confidence and competence look identical from a distance - Silicon Canals

The gap between perceived success and actual competence is significant, often leading to overconfidence in those with limited knowledge.
Marketing
fromEntrepreneur
4 days ago

How to Navigate Brand Authenticity in the Age of AI Slop

Originality and authenticity in content are essential for brands to stand out in a saturated market dominated by low-quality AI-generated content.
US politics
fromWIRED
4 days ago

Edward 'Big Balls' Coristine Is Helping Out on Viral Fraud Videos Now

Nick Shirley claims his video on California fraud was supported by data from Edward Coristine of the Department of Government Efficiency.
Privacy technologies
fromComputerWeekly.com
5 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#deepfakes
#ai-ethics
fromPsychology Today
2 months ago
Artificial intelligence

AI Can Make Dishonesty Easier

Delegating tasks to AI increases willingness to request and obtain dishonest actions because AI complies more readily and moral disengagement reduces perceived responsibility.
#trust
fromSilicon Canals
1 month ago
Relationships

9 phrases that immediately make people trust you less, and most people use at least 3 of them daily without realizing the damage - Silicon Canals

fromSilicon Canals
1 month ago
Relationships

9 phrases that immediately make people trust you less, and most people use at least 3 of them daily without realizing the damage - Silicon Canals

#cybersecurity
fromNextgov.com
1 day ago
Information security

Government official impersonation scam complaints doubled in 2025, FBI report shows

Information security
fromNextgov.com
1 day ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
Information security
fromThe Hacker News
6 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Cryptocurrency
fromCointelegraph
2 weeks ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Psychology
fromPsychology Today
1 week ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
#artificial-intelligence
Psychology
fromPsychology Today
6 days ago

AI Doesn't Flatter You: It Does Something Worse

AI models affirm user actions more than humans, leading to increased conviction and reduced willingness to apologize.
Psychology
fromPsychology Today
6 days ago

AI Doesn't Flatter You: It Does Something Worse

AI models affirm user actions more than humans, leading to increased conviction and reduced willingness to apologize.
#manipulation
Relationships
fromPsychology Today
2 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
Psychology
fromSilicon Canals
2 weeks ago

Nobody warns you that the fakest people you'll ever meet won't be the obvious ones - they'll be the ones who remember your birthday, ask about your kids, and make you feel seen right up until the moment their kindness stops being useful to them - Silicon Canals

Fake niceness can be a strategic manipulation to create indebtedness rather than genuine connection.
Relationships
fromPsychology Today
2 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
Psychology
fromSilicon Canals
2 weeks ago

Nobody warns you that the fakest people you'll ever meet won't be the obvious ones - they'll be the ones who remember your birthday, ask about your kids, and make you feel seen right up until the moment their kindness stops being useful to them - Silicon Canals

Fake niceness can be a strategic manipulation to create indebtedness rather than genuine connection.
Television
fromwww.scientificamerican.com
3 weeks ago

The secret psychology behind the best backstabs in The Traitors

Scientific research reveals behavioral and physiological indicators that can help identify liars, while also explaining techniques that make deception more effective.
Miscellaneous
fromSilicon Canals
3 weeks ago

Psychology says the thing most people lie about on Monday morning - "how was your weekend" - falls into one of these 6 categories, and the specific lie a person tells reveals which part of their life they're performing and which part they're protecting - Silicon Canals

People tell patterned lies about their weekends to colleagues, revealing deeper anxieties about how they're perceived at work.
Psychology
fromHuffPost
6 days ago

8 Sneaky Signs You're Being Emotionally Manipulated

Emotional manipulation often manifests through subtle control, leading to confusion and anxiety in relationships.
Relationships
fromwww.theguardian.com
2 weeks ago

Friendship fraud: warnings of rise in insidious' scam targeting older people

Friendship fraud targets older individuals, exploiting their loneliness and leading to significant financial losses through small, repeated requests for money.
Online marketing
fromZDNET
4 weeks ago

Watch this, get rich, lose it all - 8 ways to spot and avoid investment scams on Meta

A Russian-speaking cybercriminal network operates 300+ malvertising campaigns across 25 countries using fake Meta ads impersonating trusted media brands and celebrities to lure victims into investment scams.
#imposter-syndrome
Psychology
fromSilicon Canals
1 week ago

I stopped calling it imposter syndrome when I realized the feeling wasn't that I didn't belong in the room. The feeling was that every room I'd ever entered had rules I had to decode in real time while everyone else seemed to have received the manual in advance. That's not an imposter problem. That's a class problem. - Silicon Canals

Imposter syndrome often reflects the reality of navigating environments designed for those with class advantages, not a psychological deficiency.
Psychology
fromThe Gottman Institute
3 weeks ago

What If Imposter Syndrome Is a Relationship Problem? Applying Gottman Research to the Self

Imposter syndrome may function like a troubled internal relationship where your mind habitually scans for failure while dismissing accomplishments and positive evidence of capability.
Psychology
fromSilicon Canals
1 week ago

I stopped calling it imposter syndrome when I realized the feeling wasn't that I didn't belong in the room. The feeling was that every room I'd ever entered had rules I had to decode in real time while everyone else seemed to have received the manual in advance. That's not an imposter problem. That's a class problem. - Silicon Canals

Imposter syndrome often reflects the reality of navigating environments designed for those with class advantages, not a psychological deficiency.
Psychology
fromThe Gottman Institute
3 weeks ago

What If Imposter Syndrome Is a Relationship Problem? Applying Gottman Research to the Self

Imposter syndrome may function like a troubled internal relationship where your mind habitually scans for failure while dismissing accomplishments and positive evidence of capability.
Relationships
fromSlate Magazine
2 weeks ago

My Husband's Fear of Identity Theft Is Making Our House Unlivable

Pre-approved credit card offers contain insufficient information for identity theft; shredding all junk mail is unnecessary, though tearing by hand adds minimal extra security.
fromCointelegraph
1 month ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering derives from the Chinese expression 'Sha Zhu Pan,' which refers to nurturing a target like livestock prior to slaughter. Applied to fraud, it entails scammers forging deep personal connections over extended periods. They then coax victims into sending funds to a deceptive digital currency venture.
Cryptocurrency
Psychology
fromPsychology Today
1 week ago

Do Your Identities Make You Vulnerable to Misinformation?

Tightly overlapping identities increase vulnerability to misinformation, while distinct identities enhance resilience against biased information processing.
Information security
fromTheregister
1 week ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
Information security
fromThe Hacker News
2 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Artificial intelligence
fromThe Hacker News
3 weeks ago

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

AI-powered agentic web browsers can be manipulated through their reasoning processes to bypass security measures and fall victim to phishing attacks within minutes.
Psychology
fromOpen Culture
2 weeks ago

Why Smart People Feel Like Frauds: The Psychology of Impostor Syndrome and Its Hidden Benefits

Incompetent individuals often overestimate their competence, while highly competent individuals may doubt their abilities, reflecting the Dunning-Kruger effect and impostor syndrome.
#gaslighting
Relationships
fromPsychology Today
3 weeks ago

How Gaslighters Con Their Partners into Believing Them

Gaslighting is deliberate manipulation where someone convinces you your memory is wrong, exploiting memory's natural fallibility to control partners in close relationships.
fromSilicon Canals
1 month ago
Psychology

8 phrases manipulators slip into casual conversation that make you question your own reality - Silicon Canals

Relationships
fromPsychology Today
3 weeks ago

How Gaslighters Con Their Partners into Believing Them

Gaslighting is deliberate manipulation where someone convinces you your memory is wrong, exploiting memory's natural fallibility to control partners in close relationships.
fromSilicon Canals
1 month ago
Psychology

8 phrases manipulators slip into casual conversation that make you question your own reality - Silicon Canals

Marketing
fromBusiness Insider
1 month ago

An OpenAI ad hoax mystery just got a new twist

An orchestrated marketing campaign involving a fake leaked Super Bowl ad for OpenAI's hardware device generated viral engagement through coordinated social media posts and influencer outreach.
Psychology
fromPsychology Today
2 weeks ago

What's Behind the Fake Review

Fake content spreads rapidly due to emotional triggers and biases, necessitating critical thinking over social proof in decision-making.
Music
fromwww.theguardian.com
1 month ago

Experience: my record company replaced me with an impostor'

Debbie Deb's breakthrough in 1984 freestyle music came through a chance meeting with producer Pretty Tony, resulting in hit singles despite being hired as an artist-for-hire with minimal compensation while a different performer represented her publicly.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Psychology
fromPsychology Today
3 weeks ago

Why False Accusations Are So Disturbing

False accusations are uniquely disturbing because they violate the just-world hypothesis, undermining our belief that fairness exists and people deserve their outcomes.
Psychology
fromBusiness Insider
3 weeks ago

The 10-second trick to spot a liar, according to a psychopathy researcher

Open-ended and unexpected questions make it harder for people with dark personality traits to lie convincingly.
US news
fromABA Journal
2 months ago

Scammers solicit gift card purchases posing as district attorney

Scammers impersonating the Santa Barbara County district attorney contact residents by email and text to solicit gift card purchases and personal information.
UX design
fromMedium
4 months ago

The Psychology Of Trust In A World Where Products Keep Breaking Promises

Frequent product changes that alter established user workflows erode trust and increase confusion, making adoption harder in B2B/SaaS environments.
fromPCWorld
1 month ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Philosophy
fromPsychology Today
2 months ago

Suppressing Doubt Is Lying to Ourselves

Doubt is essential for genuine learning and conviction; labels and certainty suppress inquiry and create biased, illusory conviction.
fromwww.independent.co.uk
2 months ago

How your entire identity could be sold for 30 on the dark web

British identity packages, including an ID scan, a selfie, and a dossier of personal data, can be purchased by criminals on the dark web for as little as 30, new research suggests. As identity theft continues to rise, experts have discovered the sale of national identity documents, driving licences, credit card details and 2,000 UK frequent traveller passports. The information can be exploited in multiple ways and used to apply for credit cards, mortgages, car loans, or to open bank accounts.
UK news
Psychology
fromwww.theguardian.com
4 weeks ago

Charismatic and extremely confident': how to recognise and handle a psychopath

Psychopathic and dark personality traits exist on a continuum across all social levels, from families to institutions, affecting approximately 1% of the general population at clinical levels.
fromTechCrunch
1 month ago

FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach | TechCrunch

Impostors are impersonating our reporters to extract sensitive business information from unsuspecting targets. In several cases we know about, scammers have adopted the identity of actual staff members, crafting what looks like a standard media inquiry about a company's products and requesting an introductory call.
Information security
US news
fromwww.npr.org
1 month ago

How the use of AI and 'deepfakes' play a role in the search for Nancy Guthrie

Advanced AI deepfakes and fake ransom attempts are complicating verification and delaying the search for missing 84-year-old Nancy Guthrie.
#romance-fraud
fromTechzine Global
1 month ago

How phishing service Tycoon 2FA went under

Tycoon 2FA, a Phishing-as-a-Service (PhaaS) platform, enabled thousands of cybercriminals to steal login credentials and session tokens. Even accounts secured with MFA could be compromised via a single email. The service had been active since at least 2023 and quickly grew to become one of the most widely used phishing platforms in the world.
Information security
Privacy professionals
fromSlate Magazine
1 month ago

Help! We Just Dodged an Obvious Scam Call. But One Thing the Scammer Said Has Us Extremely Worried.

A man is falsely credited as the named creator of an Islamophobic book under his name, risking career and reputation; he seeks removal.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromwww.bbc.com
1 month ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Artificial intelligence
fromPsychology Today
2 months ago

Fake News, A.I. Deepfakes, and the Pageant of the Unreal

Modern technologies, especially AI, enable large-scale fabrication of truth, increasing misinformation and facilitating AI-powered propaganda that manipulates human beliefs and behavior.
Artificial intelligence
fromMedium
2 months ago

What if AI lies about you?

AI summaries improve convenience but can confidently present misinformation about people; interfaces must signal uncertainty and provide correction mechanisms.
Relationships
fromSlate Magazine
2 months ago

Help! I've Told Everyone in My Life a Lie About My Family for Years. It's Finally Caught Up to Me.

Admit the fabricated orphanhood honestly, explain why you lied, and communicate empathy for your partner's feelings to rebuild trust.
Relationships
fromPsychology Today
1 month ago

How Collectors Deceive Their Partners

Collectors commonly hide hobby spending from partners; men and women use different methods and degrees of underreporting, with women averaging higher percentage concealment.
Information security
fromTravel + Leisure
1 month ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromSilicon Canals
2 months ago

10 subtle behaviors that reveal someone isn't actually a good person, even if everyone likes them - Silicon Canals

I spent years interviewing people for my articles, and one pattern kept emerging: The most likeable people weren't always the kindest. After ending a friendship with someone who constantly competed with me while maintaining a perfect public persona, I started paying attention to the subtle behaviors that reveal someone's true character. These aren't obvious red flags like cruelty or dishonesty. They're the small, easily overlooked actions that slowly poison relationships and environments.
Relationships
Artificial intelligence
fromFast Company
2 months ago

AI can now fake the videos we trust most. How to tell the difference-and how newsrooms can respond

AI-generated videos now convincingly mimic trusted eyewitness formats, making fake footage indistinguishable from real and undermining information reliability.
fromSilicon Canals
2 months ago

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Last month, I sat across from one of the brightest people I know as he explained how he'd lost nearly everything to a sophisticated scam. This wasn't some naive teenager or technophobe. This was my friend from university days, a retired executive who'd navigated corporate politics for decades and made shrewd investment decisions his whole life. Watching him piece together how it happened was like watching someone solve a puzzle in reverse.
Psychology
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Psychology
fromPsychology Today
2 months ago

Why Bluffing Isn't Always Just "Harmless" Fun

Bluffing is a widespread psychological tactic that escalates from opportunistic signaling to organized deception, enabling scams and fraud by exploiting trust and cognitive biases.
Information security
fromSecurityWeek
2 months ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
Information security
fromTheregister
1 month ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
Information security
fromDefector
1 month ago

This Week In Delicious Scams; Or, I Yam Not What You Think I Yam | Defector

Certain plants produce berry-like bulbils that mimic edible fruit to attract animals, facilitating asexual propagation and deceptive dispersal.
fromSecuritymagazine
2 months ago

Is Email the Entry Point to a Well-Rounded Disinformation Attack?

Generative models learn an executive's tone and syntax from public posts, press releases and meeting transcripts. Attackers then craft messages indistinguishable from authentic correspondence. But the real innovation isn't the text, it's the choreography. A fraudulent email may serve only as the opening move. Within minutes, the target receives a confirming voice message that sounds like the executive whose name appears in the signature block. A deepfaked video may follow, asking for "final authorization." Email opens the door; other channels walk through it.
Information security
Information security
fromSecuritymagazine
2 months ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
[ Load more ]