Blog

Skimming Big Business targeting Big Business

by Robert Siciliano

Creditcard with Lock

Skimming means more than just cutting fat off steak; it’s also when a thief obtains data from that magnetic strip on the back of your credit card (or debit or ATM card). … Continue Reading

ID Theft Rings Install Card Skimmers Across Florida

by Denise Richardson

Credit card background, shallow DOF

Florida’s dubious distinction as the number one state in the US for identity theft is unfortunately well-earned. The number of cases of identity theft reported here each year dwarfs the number of reports filed in most other states, and generally has a significant lead over whichever state holds the number 2 position. … Continue Reading

ATM Alert! New Skimmer Being Used by Thieves

by Debra N. Diener J.D. CIPP G

Credit card background, shallow DOF

We’ve heard and read about the ways thieves turn ATMs into their personal money machines. We try to remember how to avoid having our private financial information and money stolen. But we’re busy and that’s part of the usefulness of ATMs — we can get quick access to our accounts and money. … Continue Reading

Identity Theft: Smile, Your ID is on Candid Camera

by J_Pratt

iPhoneCamera

Fellow American Fraud Fighter, James Bonnette, Detective Corporal of the Athens Police Department, shares a great tip:

“At the register: Don’t forget that almost everyone has a cell phone and almost every cell phone has a camera. When standing in line at the register, do not lay your Driver’s License, Credit or Debit Card etc. down for any length of time. The person behind you just might snap a picture of your information!” … Continue Reading

Card Fraud: Tips from a Reformed Fraudster

by J_Pratt

Credit card background, shallow DOF

As much as we “do-gooders” try to foresee what criminals are going to come up with next so we can try to figure how to cut them off at the pass, it’s very hard for most of us to think like a crook. Therefore, I’m always interested to learn about fraud from the criminals’ perspective. In an interview[1] earlier this year, a former credit card fraud operator shared what he does to protect himself from becoming a fraud victim. A few of his comments were particularly insightful … Continue Reading

More from our blog

computer w lock
Beware of Rich Text “Poisened” Files

This is a “heads up” for people who use Rich Text (RTF) files. Brad Chacos reported recently that hackers are using “poisoned” RTF files to gain control of consumers’ PCs (www.csoonline; “Just previewing email can give attackers control of your PC, Microsoft warns”; March 25, 2014). … Continue Reading

Red triangular other dangers warning sign on white
Don’t Fall for Google Drive Phishing Scam

Sophisticated scammers have created a fake Google log-in screen that is actually hosted on the company’s servers. Watch out for scam Google Drive emails that prompt you to enter your username and password into this look-alike form. … Continue Reading

Airport Wi-Fi
How To Stop Criminal Hackers In Their Tracks

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Proud to be a 2013 National Cyber Security Awareness Month (NCSAM) Champion

NCSAM-Champion

In partnership with:

stc logo