{"href":"http://player.captivate.fm/services/oembed?url=http%3A%2F%2Fplayer.captivate.fm%2Fepisode%2F2744d434-4615-4abc-9f8e-cd701fb93697","version":"1.0","provider_name":"Captivate.FM","provider_url":"https://www.captivate.fm","width":600,"height":200,"type":"rich","html":"<iframe style=\"width: 100%; height: 200px;\" title=\"Phishing for Wallets: How Scammers Turn Stolen Data into Mobile Payments\" frameborder=\"0\" scrolling=\"no\" allow=\"clipboard-write\" seamless src=\"http://player.captivate.fm/episode/2744d434-4615-4abc-9f8e-cd701fb93697\"></iframe>","title":"Phishing for Wallets: How Scammers Turn Stolen Data into Mobile Payments","description":"Cybercriminals are getting smarter, and their latest trick? Using phished data to create Apple Pay and Google Wallet accounts\u2014turning stolen credentials into real-world fraud. In this episode of The Daily Threat, we break down how hackers exploit phishing scams, why financial institutions struggle to detect this type of fraud, and what you can do to protect yourself.\ud83d\udccc Topics Covered:\u2714\ufe0f How stolen credentials get converted into mobile wallets\u2714\ufe0f The tactics fraudsters use to bypass security checks\u2714\ufe0f Why banks and tech companies are struggling to stop this\u2714\ufe0f Steps YOU can take to stay safe\ud83d\udd17 Read More: Krebs on Security Article - https://krebsonsecurity.com/2025/02/how-phished-data-turns-into-apple-google-wallets/\ud83d\udcac Stay Informed! Drop a comment below with your thoughts, and don\u2019t forget to like, subscribe, and hit the bell \ud83d\udd14 so you never miss an update on the latest cybersecurity threats.\ud83d\udea8 Follow us for daily cybersecurity news:\ud83c\udf10 Website: www.dailythreat.com#Cybersecurity #Phishing #MobilePayments #FraudPrevention #TheDailyThreat","thumbnail_width":300,"thumbnail_height":300,"thumbnail_url":"https://artwork.captivate.fm/0d10ae80-c1d0-4360-ba34-8a1881a2c338/TVu8oJdWX3iRnKhOuiBTWcem.png"}