Blog

Check Fraud: The Theft That Started It All

by ITRC

Writing a Check

Before the Internet and options like online banking and bill pay—I know, it’s hard to remember that far back, isn’t it?—would-be identity thieves had to work a little harder to gain access to your financial information. … Continue Reading

Support FraudAvengers by Shopping at AmazonSmile

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

Amazon banner

Tax Refund Thieves can be thwarted

by Robert Siciliano

Definition of fraud

If your tax refund doesn’t come, don’t be quick to blame the government. Tax refund fraud is very common. The IRS pays billions in fake refunds. … Continue Reading

Don’t Let Them Call You Sweetheart

by J_Pratt

heart.jpg

Among the most painful scams are those in which the victim believes the villain truly cares for them. This connection allows the miscreant to exploit their affection, abusing them financially as well as emotionally. These are known as Romance or Sweetheart scams. … Continue Reading

Check Fraud: What To Do When It Happens to You

by ITRC

Writing a Check

The first step is to call your bank and shut down the checking account. You must file a police report with your local police department stating the check book was stolen.

You will need to go to the bank and have Customer Service go through your account and verify the checks clearing through the account are yours. … Continue Reading

Check Fraud: Can You Still Trust A Cashier’s Check?

by J_Pratt

fraudb&w

Cashier’s Checks have long been considered the “gold standard” of checks. Drawn on the bank itself, there is no question that the funds are good. So if someone wants to give you a Cashier’s Check (or “Official Check”) there’s no fraud risk, right?

Wrong. … Continue Reading

← Older Posts

More from our blog

ComputerVirus
What Is a Trojan Horse?

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that the Greeks hid in to enter the city of Troy and take it over. Two thousand and some odd years later, hackers use a digital Trojan horse to hide malicious files in seemingly harmless files with the intent to attack or take over your device. … Continue Reading

inbox
Phishing email from your Boss

Hello all- I wanted to give you a quick heads up on yet another trend in phishing. We received this email at ID Experts late last week but I have since learned that a number of people have received similar emails across the country. … Continue Reading

Tech Devices
Steps to Manage a secure online backup

Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should just throw in the towel, as the saying goes, and figure “What’s the point?”. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo