The hottest Online Scams Substack posts right now

And their main takeaways
Category
Top Culture Topics
Thái | Hacker | Kỹ sư tin tặc 11143 implied HN points 25 Dec 23
  1. Tech giants like Microsoft, Google, and Meta have dedicated teams to combat fraud from Vietnamese individuals.
  2. Individuals from Vietnam have been involved in creating fake online accounts and engaging in various forms of online fraud, causing significant financial losses.
  3. Vietnam has a reputation for fraud and account takeover schemes in the global community, leading to distrust and higher trading costs for the country.
Conspirador Norteño 36 implied HN points 28 Nov 24
  1. Handle squatting is when people register social media handles to sell them later. Even though Bluesky allows custom domain names as handles, some still try to squat.
  2. Buying account names is risky and usually a bad idea. It's better to create your own accounts instead of getting them from spammers.
  3. Some recent accounts on Bluesky show repetitive bios and were created in batches, indicating possible spam activity. One such account even changed its bio to seem more legitimate.
Natto Thoughts 39 implied HN points 01 Sep 23
  1. Chinese criminal groups have rapidly expanded cyber scam operations targeting victims worldwide, utilizing tactics like false romantic ploys and false investment schemes.
  2. The cyber scam industry in China has become industrialized, professionalized, and involves cross-border operations, employing professionals, leveraging gray technology development industry chains, and exploiting corrupt insiders.
  3. To avoid falling victim to cyber scams, it's crucial to be vigilant, use common sense, and verify offers that sound too good to be true.
The End(s) of Argument 0 implied HN points 17 May 21
  1. Be cautious of free key holders given out at gas stations, as some may contain hidden tracking devices.
  2. Verify the credibility of alarming claims before panicking. Many conspiracy theories have logical flaws upon closer inspection.
  3. Some urban legends, like the one about tracking devices in key rings, may have originated from a real event but have been perpetuated over time through misinformation.
Get a weekly roundup of the best Substack posts, by hacker news affinity: