News

Here’s how the cloning scams usually work: Cybercriminals create copycat profiles using stolen photos and publicly available information. Then, they send friend requests to people on that person ...