Explore Problems

Showing 55 of 4,293 problems · matching your filters

Identity Theft Causing Persistent Inaccurate Credit Reporting on TransUnion

Identity theft victims frequently find fraudulent accounts and inquiries persisting on their TransUnion credit reports, negatively impacting credit scores and financial standing. Disputing these inaccuracies requires navigating complex FCRA processes without adequate tooling support. The problem is high-frequency, structurally persistent, and affects millions of consumers.

1 mentions1 sources Trending
S6.7L7
Consumer & Lifestyle · Personal Finance

Air-Gapped Networks Have No Passive Threat Detection Without Active Scanning Risk

Security teams protecting air-gapped environments — defense, ICS, nuclear — cannot use conventional network detection tools that require active probes, which risk triggering false alerts or disrupting critical operations. Passive monitoring that can identify C2 beacons and DNS generation algorithm traffic without sending any packets is absent from the market. This leaves some of the highest-value targets with a fundamental detection blind spot.

1 mentions1 sources
S6.6L8
Security & Compliance · Network Security

Phone Theft Enables Immediate High-Value Zelle and Venmo Fraud Banks Refuse to Refund

Thieves who steal unlocked phones can immediately execute thousands of dollars in Zelle and Venmo transfers before the owner can react. Payment apps treat physical phone possession as sufficient authorization, creating a structural gap where theft of a device equals theft of funds. Banks and payment platforms systematically deny fraud refunds for these transactions because the device was used directly.

1 mentions1 sources Trending
S6.6L7
Security & Compliance · Fraud Prevention

Banks Denying Reg E Claims by Conflating Authentication with Authorization

Financial institutions deny unauthorized electronic fund transfer claims by pointing to credential usage or IP addresses as proof of authorization, misapplying Regulation E. Victims of identity theft and account takeover are left without recourse because banks refuse to distinguish between authentication and customer intent. This creates a structural gap that systematically disadvantages fraud victims.

9 mentions1 sources Trending
S6.5L6
Security & Compliance · Fraud Prevention

Banks Refuse to Block Fraud on Pending Transactions, Leaving Accounts Drained

When fraud is detected on pending transactions, banks refuse to reverse or block charges until they post, leaving accounts completely emptied while victims wait. This policy gap is actively exploited by fraudsters who target the same bank branch repeatedly. Other institutions proactively stop pending fraud, making this a solvable but ignored problem.

2 mentions0 sources
S6.5L6
Consumer & Lifestyle · Personal Finance

Safety-Critical Professionals Cannot Search Large Technical Manuals Under Time Pressure

Pilots, engineers, and technicians must locate precise data buried in 600-page PDFs during time-sensitive workflows, but manual searching is slow and cloud AI tools require uploading sensitive or classified documents. The need for fast, accurate, offline document querying is unmet by current tools.

1 mentions1 sources
S6.5L8
Productivity · Knowledge Management

Insurance Policies Deliberately Obscured With Jargon, Clauses Hidden Until Claims

Insurance contracts are routinely 50+ pages of dense legal language that consumers cannot meaningfully understand before signing. Critical exclusions and limitations only become apparent when a claim is filed and denied. This information asymmetry is structural and benefits insurers at the expense of policyholders.

1 mentions1 sources
S6.5L7
Industry Verticals · Insurance

Government Agency Impersonation Fraud Causing Banks to Deny Fund Recovery

Fraudsters impersonating law enforcement pressure consumers into transferring funds to protect them from fabricated investigations. Banks refuse to reverse these transfers despite clear evidence of impersonation fraud and social engineering. The combination of urgency tactics and legitimate-looking impersonation defeats existing bank fraud detection systems.

1 mentions1 sources Trending
S6.4L6
Security & Compliance · Fraud Prevention

Online Car Platforms Sell Vehicles With Undisclosed Defects Requiring Major Repairs

Consumers purchasing vehicles through online-only dealers receive cars with significant pre-existing mechanical defects not disclosed during the sale. Engine failures and safety issues emerge within days of delivery, but the return and repair process is slow, contested, and rarely covers full costs. No independent pre-delivery inspection is offered or required.

1 mentions1 sources
S6.4L6
Industry Verticals · E-commerce & Retail

Bank Impersonation Scams Exploit Zelle for Irreversible Fund Theft

Fraudsters impersonating bank fraud departments instruct consumers to make Zelle transfers to recover allegedly stolen funds, causing the actual theft. Banks refuse to reverse these payments despite clear evidence of social engineering. The combination of real-time payment finality and inadequate bank fraud detection creates an unaddressed consumer protection gap.

2 mentions1 sources
S6.3L8
Security & Compliance · Fraud Prevention

Credit Cards Opened Fraudulently Without Consumer Knowledge

Identity thieves open credit cards in consumers' names using stolen personal information, with activity in foreign countries consumers have no connection to. The fraud detection process is entirely reactive, triggered only when the issuer notices suspicious activity rather than at account origination. Consumers learn of unauthorized accounts only after they are already active.

4 mentions1 sources Trending
S6.3L7
Security & Compliance · Identity & Access

Sales Rep Onboarding Takes 6 Months With No Structured Path to First Deal

Most sales organizations default to either unstructured sink-or-swim onboarding or a rigid 6-month ramp timeline, both delaying time-to-revenue. Software system gaps prevent meaningful onboarding acceleration, leaving revenue at risk during every new hire cycle.

1 mentions1 sources
S6.3L8
Business Operations · Sales & CRM

AI Agents Can Execute Catastrophic Infra Actions Without Safeguards

An AI agent deleted a startup's production database and backups in 9 seconds because API keys had unrestricted delete access, backups shared the same environment as production, and no confirmation step existed for destructive actions. The incident reveals that standard infra security assumptions break catastrophically when agentic AI is introduced into deployment workflows. As AI agents gain infrastructure access, the absence of permission scoping, confirmation gates, and environment isolation creates systemic risk across all organizations using these tools.

1 mentions1 sources
S6.3L8
Developer Tools · DevOps & Infrastructure

Banks Unable to Cancel Pending Unauthorized Charges in Real Time

When consumers identify a fraudulent or incorrectly-billed charge while it is still in pending status, banks uniformly refuse to intervene — citing policy that disputes can only be filed after settlement. This window between authorization and settlement is precisely when interception would prevent harm, yet the system design forecloses that option. The result is customers must absorb the charge first, then navigate a dispute process with uncertain outcomes.

4 mentions1 sources
S6.3L7
Industry Verticals · FinTech & Banking

Bank leaked customer account details and SSN to scammers then denied responsibility

A bank customer had full account details including SSN leaked to scammers who used them to lock the customer out of their own accounts. Despite not disputing the data release, the bank refused reimbursement claiming no harm was done. This reflects a structural failure in bank data security combined with an accountability gap when breaches occur.

1 mentions1 sources
S6.3L6
Security & Compliance · Data Privacy

No Unified SDK for Object Storage Across Cloud Providers

Developers must use separate, incompatible SDKs for each cloud storage provider (S3, GCS, Azure Blob, R2), creating vendor lock-in and requiring rewrites when switching or supporting multiple backends. A unified abstraction layer is missing in the JavaScript ecosystem. 229 HN upvotes validates strong developer demand.

1 mentions1 sources
S6.3L8
Developer Tools · APIs & Integrations

Identity Theft Victims Face Bureaucratic Delays on Credit Report Block Requests

Despite a 4-business-day legal obligation under FCRA 605B, credit bureaus delay or stall identity theft block requests, demanding excessive documentation and refusing to act on clear fraud evidence. Creditors ignore direct consumer outreach, forcing victims into a bureaucratic loop while fraudulent accounts continue damaging their credit. The gap between legal rights and bureau compliance leaves identity theft victims without effective recourse.

5 mentions1 sources
S6.3L7
Consumer & Lifestyle · Personal Finance

ML Data Stacks Require Custom Glue Code Across dbt, Airflow, Feature Stores, and BI

Data and ML teams spend significant engineering time writing custom integration code to connect separate tools in the modern data stack. Each handoff between dbt, Airflow, feature stores, and BI layers requires bespoke connectors with no standardized interface. This fragmentation multiplies maintenance burden and slows iteration on ML features.

1 mentions1 sources
S6.3L7
Data & Infrastructure · Data Pipelines & ETL

Bank of America Debit Card Compromised Four Times in Three Months

A Bank of America customer had their debit card compromised four separate times in three months, with the bank's only remedy being card replacement each time. There is no root cause investigation or proactive protection, leaving customers in a loop of account intrusion. The repeated failures indicate a systemic gap in fraud detection and real-time account protection.

1 mentions1 sources
S6.3L6
Security & Compliance · Fraud Prevention

Paid market research reports are mostly recycled public data at premium prices

Businesses pay $5,000–$10,000 for consulting market research reports that turn out to be repackaged public information from LinkedIn, press releases, and company websites. The lack of original insight makes these reports poor value for competitive intelligence. Demand is strong for AI-driven, verifiable, continuously updated competitive intelligence tools.

1 mentions1 sources
S6.3L8
Business Operations · Startup & Founder Ops
1/3Next