Blog

Do You Really Want Your Medical Records Stored in the Cloud?

by Jim Malmberg

MedicalData

Cloud computing has become all the rage. For the indoctrinated, cloud computing allows corporations to store information on a third party’s computers. Companies will tell you that cloud computing provides them with a number of advantages. … Continue Reading

ncsamtw2_cvr14-578

The Right and Wrong Ways to Prevent Identity Theft

by Linda Vincent R.N. P.I.

Identity Theft in Progress

Numerous data breaches have occurred over the past few years. From the Target data breach to electronic health records being tapped into, consumers are at risk for identity theft like never before. Unfortunately, most are completely unaware of it. Many even assume that credit monitoring is enough to protect themselves from identity theft. … Continue Reading

What Students Need to Know about Cybersecurity

by ITRC

YoungCoupleOnComputer

With the constant news reports about hacking or data breaches, it can feel like cybersecurity is a wasted effort, but it’s not. While cyberthieves are getting very crafty about their practices and their intended targets, your own behavior can do a lot to minimize how much you’re affected. … Continue Reading

Russian Organized Crime: Krem D’la Krem of Hackers

by Robert Siciliano

cybercrime

The Russians have definitely come…in the world of cybercrime. A Russian ring of hackers has amassed 1.2 billion stolen passwords and usernames involving 400,000 websites. The criminals have also garnered 542 million e-mail addresses.
Continue Reading

Put firm limits on using hotel business center computers

by Robert Gregg

Malware

Yet another “heads up” coming from the privacy, security, data breach and ID theft world. We have all seen the convenient “Business Centers” that many hotels have that allow you to do all kinds of things without having to plug in your laptop. … Continue Reading

← Older Posts

More from our blog

WirelessInternetRouter
How to see and boot off Someone using your WiFi

You were taught to share your toys as a young child, but this doesn’t apply to letting others use your Wi-Fi. The difference between sharing the plastic shovel and sharing the wireless connection is that with the latter, who’s to say that the “thief” won’t eventually crash in on your private information? … Continue Reading

Scam
Scammers bank on Ebola fears

One thing we’ve learned at the Federal Trade Commission is that scams often follow the news – especially when there’s a health scare in the headlines.
Continue Reading

ncsam_google_plus_profile
Growing Up in a Connected World

A companion piece to the “Cyberspace” youth rap video, “Growing Up in A Connected World” continues the discussion on cyber safety with interviews with parents, teachers and students on the topics of online safety, cyberbullying, and raising cyber savvy kids. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo