Explore Problems

Showing 799 of 4,293 problems · matching your filters

Unauthorized Credit Cards Opened at Retail Point-of-Sale

Retail store employees open credit card accounts using customer IDs without obtaining consent or social security numbers, exploiting POS system vulnerabilities. Victims discover fraudulent accounts on credit reports months later with no clear dispute path.

56 mentions1 sources
S6.9L7
Security & Compliance · Fraud Prevention

Salesforce Locks Essential CRM Features Behind Expensive Add-On Tiers

Salesforce's pricing model places many of its most valuable features in premium add-on tiers, making the true cost of a functional deployment far higher than base plan pricing suggests. This tiered gating disproportionately affects mid-market companies that need advanced capabilities but cannot justify enterprise pricing. The practice has driven sustained interest in CRM alternatives with more transparent feature bundling.

8 mentions2 sources
S6.8L7
Business Operations · Sales & CRM

Bank Fraud Algorithms Block Legitimate Purchases During Emergencies

Fraud detection systems flag legitimate purchases as suspicious when spending patterns shift during emergencies like natural disasters or displacement. The algorithms apply static behavioral models that cannot account for life disruptions. Cardholders are left unable to purchase essentials precisely when they most need access.

33 mentions1 sources
S6.8L7
Industry Verticals · FinTech & Banking

Synchrony Bank Processes Large Unauthorized Payments From Closed Accounts With No Explanation

Synchrony Bank initiated a $6,200 payment the consumer never authorized, claimed funds were coming from a closed bank account, and provided no clarity on how the transaction was possible or how to stop it. Consumer faces credit damage and fees with no resolution path.

17 mentions1 sources
S6.7L7
Industry Verticals · FinTech & Banking

Banks deny fraud disputes when victims were deceived into authorizing Zelle payments

Consumers targeted by impersonation scams — where fraudsters pose as legitimate vendors — are losing dispute claims because banks treat the payments as "authorized" even when the authorization was obtained through deception. Victims have no recourse once funds leave via Zelle. The problem is structural: payment networks lack liability frameworks for authorized-push-payment fraud.

93 mentions1 sources Trending
S6.7L9
Security & Compliance · Fraud Prevention

npm Ecosystem Silently Executes Malicious Code via Transitive Dependencies

Every npm install is an implicit trust decision across hundreds of packages, any of which can execute arbitrary code via postinstall hooks with no user confirmation. The Axios backdoor attack demonstrated this at 80M weekly download scale, with sophisticated obfuscation and self-cleanup. Existing tools like Snyk detect known vulnerabilities but do not prevent silent postinstall execution from newly compromised accounts.

3 mentions2 sources
S6.7L8
Security & Compliance · Fraud Prevention

Identity Theft Causing Persistent Inaccurate Credit Reporting on TransUnion

Identity theft victims frequently find fraudulent accounts and inquiries persisting on their TransUnion credit reports, negatively impacting credit scores and financial standing. Disputing these inaccuracies requires navigating complex FCRA processes without adequate tooling support. The problem is high-frequency, structurally persistent, and affects millions of consumers.

1 mentions1 sources Trending
S6.7L7
Consumer & Lifestyle · Personal Finance

Air-Gapped Networks Have No Passive Threat Detection Without Active Scanning Risk

Security teams protecting air-gapped environments — defense, ICS, nuclear — cannot use conventional network detection tools that require active probes, which risk triggering false alerts or disrupting critical operations. Passive monitoring that can identify C2 beacons and DNS generation algorithm traffic without sending any packets is absent from the market. This leaves some of the highest-value targets with a fundamental detection blind spot.

1 mentions1 sources
S6.6L8
Security & Compliance · Network Security

Phone Theft Enables Immediate High-Value Zelle and Venmo Fraud Banks Refuse to Refund

Thieves who steal unlocked phones can immediately execute thousands of dollars in Zelle and Venmo transfers before the owner can react. Payment apps treat physical phone possession as sufficient authorization, creating a structural gap where theft of a device equals theft of funds. Banks and payment platforms systematically deny fraud refunds for these transactions because the device was used directly.

1 mentions1 sources Trending
S6.6L7
Security & Compliance · Fraud Prevention

Debt Collectors Report Paid Debts as Unpaid to Credit Bureaus

Collection agencies continue reporting debts as unpaid even after consumers provide clear payment documentation, forcing ongoing disputes. The credit reporting system has no real-time reconciliation mechanism, so paid debts linger as negatives while collectors ignore dispute evidence. This pattern repeats across millions of Americans managing past debt.

59 mentions1 sources
S6.6L7
Industry Verticals · FinTech & Banking

Bank of America Processes Unauthorized ACH Withdrawals After Written Revocation

Bank of America continued debiting a consumer's account after receiving a written revocation notice, ignoring the legal instruction and extracting funds without authorization. High mention count and upvotes confirm this is a widespread systemic failure at major banks.

17 mentions1 sources
S6.5L7
Industry Verticals · FinTech & Banking

Insurance policies lapse silently due to payment system errors

Autopay failures on insurance policies trigger silent policy cancellations with no customer notification, leaving homeowners unknowingly uninsured for months. The failure is compounded by siloed internal systems that prevent even the insurer's own support staff from diagnosing what happened.

3 mentions1 sources
S6.5L8
Customer Experience · Service & Billing Disputes

Safety-Critical Professionals Cannot Search Large Technical Manuals Under Time Pressure

Pilots, engineers, and technicians must locate precise data buried in 600-page PDFs during time-sensitive workflows, but manual searching is slow and cloud AI tools require uploading sensitive or classified documents. The need for fast, accurate, offline document querying is unmet by current tools.

1 mentions1 sources
S6.5L8
Productivity · Knowledge Management

AI coding agents need full-computer sandboxes with memory forking and sub-second startup

AI coding agents require sandbox environments with full operating system capabilities — not lightweight containers — including the ability to fork running memory state to explore multiple execution paths simultaneously and snapshot mid-execution for later resumption. Existing container and VM solutions are either too slow to start, too limited in capability, or cannot fork state without pausing the entire environment. This missing infrastructure capability prevents entire categories of sophisticated agentic behavior.

1 mentions1 sources
S6.5L8
Data & Infrastructure · Cloud & Hosting

Insurance Policies Deliberately Obscured With Jargon, Clauses Hidden Until Claims

Insurance contracts are routinely 50+ pages of dense legal language that consumers cannot meaningfully understand before signing. Critical exclusions and limitations only become apparent when a claim is filed and denied. This information asymmetry is structural and benefits insurers at the expense of policyholders.

1 mentions1 sources
S6.5L7
Industry Verticals · Insurance

Bank Accounts Opened Fraudulently Without Consumer Consent

Consumers discover new bank accounts opened in their name without any application or knowledge, indicating identity theft or bank error. The bank onboarding process lacks sufficient friction to prevent unauthorized account creation, leaving victims responsible for managing the fallout. This is a structural identity verification failure at major financial institutions.

21 mentions1 sources
S6.5L7
Security & Compliance · Identity & Access

Phantom Debt Collections Damaging Consumer Credit Without Recourse

Consumers are being subjected to credit report entries for debts they never incurred, with no effective mechanism to challenge collectors who ignore dispute requests. The harm is immediate — damaged credit scores block loans, housing, and employment — yet the dispute process gives collectors structural advantages over individuals. Victims have no reliable way to compel removal without expensive legal action.

7 mentions1 sources
S6.4L7
Industry Verticals · FinTech & Banking

Intercom Pricing Is Prohibitive for Startups and Small Businesses

Intercom charges per AI resolution ($0.99/resolution for Fin) on top of base subscription costs, making it unaffordable for small teams. Advanced features locked behind higher tiers further restrict smaller companies from getting full value.

22 mentions2 sources
S6.4L7
Customer Experience · Support & Helpdesk

Credit Bureaus Misreport Active Reaffirmed Loans as Discharged in Bankruptcy

After Chapter 13 bankruptcy discharge, lenders and credit bureaus incorrectly report reaffirmed auto loans as included in bankruptcy rather than active/current, causing significant credit score drops and blocking access to financing. Even after lenders acknowledge the error and promise corrections, bureaus take months to update records — or never do. With 93 mentions and 185 upvotes, this is a high-frequency, high-harm credit reporting failure.

70 mentions1 sources
S6.4L7
Consumer & Lifestyle · Personal Finance

Freelancers Cannot Afford Legal Contract Drafting

Freelancers and small businesses pay $300-$1800 per contract or skip legal protection entirely, risking non-payment and IP disputes.

1 mentions1 sources
S6.3L8.5
Business Operations · Legal & Compliance
1/40Next