Blog

Everyone is vulnerable to Attack

by Robert Siciliano

computer w lock

There’s the war on drugs, the war on terrorism, the war on cancer and the war on cyber threats. In fact, more people are vulnerable to cyber attacks than they are to the first three threats combined.

So pervasive is this threat that President Obama fully recognizes that everyone is at risk. … Continue Reading

NOT A PRETTY PICTURE: NEW DATA ON YOUTH AND SELF-CREATED SEXUALLY EXPLICIT CONTENT

by Stay Safe Online

Mother-And-Daughter-At-Home-Us-13913150

A new Microsoft*-sponsored study released today by the by the UK-based Internet Watch Foundation (IWF) reveals data adults and especially parents should know. Across the globe, young people are taking and sharing nude photos and videos of themselves, and the behavior is being exhibited by even younger age groups. … Continue Reading

This is what Spy Software looks like

by Robert Siciliano

Virus

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone was “tapped” – the device was inside the receiver. … Continue Reading

Don’t be the Next Anthem

by ID Experts

Wireless

After Anthem Inc.’s most recent breach comprised more than 80 million customers’ information, 2015 is already shaping up to be the year of the healthcare data breach. Personal data incidents are on the rise and how an organization manages incident response affects their business risks and its brand. … Continue Reading

FTC Says Identity Theft Was the Number One Consumer Complaint in 2014

by Jim Malmberg

Definition of fraud

February 27, 2015 – The FTC has announced that identity theft was the number one consumer complaint received by the agency last year. That’s no real surprise because it has been the number one consumer complaint for 15 years now. But it may no longer be the fastest growing crime. Debt collection scams were the second largest consumer complaint of 2014; with 160,000 reported incidents. That’s 100,000 more than were reported in 2013. … Continue Reading

← Older Posts

More from our blog

Virus
This is what Spy Software looks like

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone was “tapped” – the device was inside the receiver. … Continue Reading

Malware-Virus 2
Scammers Use Facebook Tags to Spread Malware

If you use Facebook, watch out for suspicious posts tagged with dozens of names. This new scam is called “malicious tagging,” and it’s tricking victims into downloading malware. … Continue Reading

Wireless
Don’t be the Next Anthem

After Anthem Inc.’s most recent breach comprised more than 80 million customers’ information, 2015 is already shaping up to be the year of the healthcare data breach. Personal data incidents are on the rise and how an organization manages incident response affects their business risks and its brand. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo