Blog

Facebook and Apple Hacked: How To Avoid it On Your Computer

by Debra N. Diener J.D. CIPP G

ComputerVirus

By now you probably have read about the latest hacks of corporate computer networks. The latest being reported were the Facebook and Apple incidents. News reports are now saying, with some level of assurance, that the companies know how this happened. Their employees visited an iPhone developers’ website that was completely infected with malware … Continue Reading

Consumer Choice: Control Your Data Online

by Better Business Bureau

WebBrowsers

We all know that advertising pays for a lot of the great, free content we see online, but how do advertisers know what kind of ads will appeal to you? They use “online behavioral advertising,” also known as “interest-based advertising,” a technique that uses your visits to website to display online ads that are most likely to interest you. … Continue Reading

Keeping Kids Safe Online

by Better Business Bureau

Boy on computer

The average child spends 2-7½ hours online every day. That’s a good chunk of time. BBB Children’s Advertising Review Unit (CARU) is here to help parents control what gets advertised to their child while they watch television, listen to the radio and surf the Web.
Continue Reading

Protect Yourself Against Identity Theft! How to Clear PII from a Mobile Device

by ITRC

Multiple Devices

Are you considering selling your old laptop or smartphone? As some of us may be aware, deleting files or data from these mobile devices is not enough. The truth is that some of what we think are “files” in these devices are actually pointers or “shortcuts” to the actual file data, and deleting these pointers from the devices will not delete the actual file data itself. … Continue Reading

What’s a Wireless “Sniffer” and Why Should I Care?

by Robert Siciliano

Airport Wi-Fi

A sniffer is a software program used by IT administrators to monitor network usage, investigate network problems, investigate network misuse and abuse, identify configuration issues and determine the state of a network’s security. Sniffers ultimately decode the data so it is readable in words, numbers and computer code.

Note that last part: “determine the state of a network’s security.” That is a big one. This is because while good-guy IT security professionals use sniffers to determine the security of a network, bad guys also use them to see your data as it travels from your device to the router communicating the wireless internet signal. … Continue Reading

← Older PostsNewer Posts →

More from our blog

ribbons Article.jpg
Beware Disaster Related Fraud and Scams

The Boston and Texas tragedies remind us that when disaster strikes, we are not always prepared to deal with the magnitude of the chaotic wake that follows such events in our communities … Continue Reading

Red triangular other dangers warning sign on white
Fake Scanner Emails Infect Office Computers

Scammers are taking advantage of the standard emails sent by most office scanners. They have replicated the messages of famous printer brands but attach malware to the emails instead of documents.

How the Scam Works:

You are at work, and you receive a message from what you think is your office printer/scanner. It appears that someone sent you a copy of a scanned document. The name doesn’t ring a bell, but you open the attachment anyway.

When you click on the file, you find that it isn’t a scanned copy of the latest office report. It’s really a link to a third-party website that will download a virus to your computer. These viruses phish for personal and banking information on your machine. … Continue Reading

Credit card background, shallow DOF
Unknown Credit Card Charges: Fraud or Legit?

Recently, my mother-in-law discovered that a pretty significant piece of jewelry had gone missing. There had been a number of construction workers in the house for a few weeks and when she went to get her jewelry, it was gone. After searching like a crazy person under/in/on top of everything, she called the police.

When the police arrived they asked a bunch of questions, did an onsite investigation and calmly and collectively stated to her: “You misplaced it. It probably hasn’t been stolen. You will find it in a few days.” … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading