Blog

How To Stop Criminal Hackers In Their Tracks

by Robert Siciliano

Airport Wi-Fi

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Credit Card Theft increasing for Banks and Retailers

by Robert Siciliano

Creditcard with Lock

2013 was the year of 740 million records involving data breaches. And that number may be erring quite on the conservative side, according to the Online Trust Alliance. The records come from a list on the Privacy Rights Clearinghouse Chronology Data Base. … Continue Reading

Data breaches: What’s a person to do?

by Federal Trade Commission

cybercrime

Recent headlines about data breaches at retail stores and universities may have you wondering if there’s anything you can do to help protect your credit going forward. The Federal Trade Commission (FTC), the nation’s consumer protection agency, says the answer is yes. … Continue Reading

An Unfortunate Fact About Shopping

by Federal Trade Commission

Manon Phone Final Notice

Another day, another announcement about a data breach.

As news trickles out about retailers that have been hacked, you may be wondering what you can do to protect yourself from fraud. Even if you’re not sure that your accounts have been affected, you can do a few things to protect your accounts, your money, and your credit reputation. … Continue Reading

Ways small businesses are preventing Breaches

by Robert Siciliano

DataTheft

How did that huge recent data breach of a major retailer occur in the first place? Well, valuables can’t be stolen if there aren’t any valuables to begin with. Large merchants will store customers’ credit/debit card data to facilitate faster transactions. But small retailers keep minimal or zero data—this will not attract thieves. … Continue Reading

← Older Posts

More from our blog

computer w lock
Beware of Rich Text “Poisened” Files

This is a “heads up” for people who use Rich Text (RTF) files. Brad Chacos reported recently that hackers are using “poisoned” RTF files to gain control of consumers’ PCs (www.csoonline; “Just previewing email can give attackers control of your PC, Microsoft warns”; March 25, 2014). … Continue Reading

Red triangular other dangers warning sign on white
Don’t Fall for Google Drive Phishing Scam

Sophisticated scammers have created a fake Google log-in screen that is actually hosted on the company’s servers. Watch out for scam Google Drive emails that prompt you to enter your username and password into this look-alike form. … Continue Reading

Airport Wi-Fi
How To Stop Criminal Hackers In Their Tracks

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Proud to be a 2013 National Cyber Security Awareness Month (NCSAM) Champion

NCSAM-Champion

In partnership with:

stc logo