Blog

What Is a Trojan Horse?

by Robert Siciliano

ComputerVirus

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that the Greeks hid in to enter the city of Troy and take it over. Two thousand and some odd years later, hackers use a digital Trojan horse to hide malicious files in seemingly harmless files with the intent to attack or take over your device. … Continue Reading

Support FraudAvengers by Shopping at AmazonSmile

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

Amazon banner

5 ways Criminals hack your PC

by Robert Siciliano

Malware

Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WILL succeed. When you operate on this assumption rather than thinking that your anti this and anti that are all you need, you’ll have the best cyber security in place.
Continue Reading

Beware of Fluffy, Furry Hackers

by Robert Gregg

DataTheft

In our never ending mission to keep you informed on the latest from the data breach, cybersecurity and identity theft world, here is a fascinating article from Business Insider that talks about some of the latest and most notorious hacker groups emerging on the scene. … Continue Reading

Data Breaches Caused by Overseas Hackers Now Receiving White House Attention

by Jim Malmberg

cybercrime

The White House has announced that the recent spate of data breaches caused by overseas hackers has risen to a level that now requires presidential attention. From now on, the President will receive regular briefings on these matters. … Continue Reading

21 ways to Prepare your Credit Cards for Overseas Travel

by Robert Siciliano

Creditcard with Lock

Imagine being overseas, and in the process of using your credit card to make a purchase—and it’s declined—and you have no currency or checkbook. Nightmare.

The decline could be to prevent fraudulent use; perhaps it was recently reported lost, but then found or the country you are in is known for fraud. … Continue Reading

← Older Posts

More from our blog

inbox
Phishing email from your Boss

Hello all- I wanted to give you a quick heads up on yet another trend in phishing. We received this email at ID Experts late last week but I have since learned that a number of people have received similar emails across the country. … Continue Reading

Tech Devices
Steps to Manage a secure online backup

Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should just throw in the towel, as the saying goes, and figure “What’s the point?”. … Continue Reading

MobileApplications
Could Fitness Apps Hurt Your Privacy?

Just last week I wrote about medical information being more sought by hackers than even credit card information. Now there’s even more information supporting the need for consumers to be even more vigilant in using wearable fitness applications. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo