Blog

Don’t be the Next Anthem

by ID Experts

Wireless

After Anthem Inc.’s most recent breach comprised more than 80 million customers’ information, 2015 is already shaping up to be the year of the healthcare data breach. Personal data incidents are on the rise and how an organization manages incident response affects their business risks and its brand. … Continue Reading

Open season for identity thieves

by Federal Trade Commission

Handwritten Insurance Claim Form with pen and calculator

It’s open season for everyone who wants to switch health coverage. As you select your health insurance plan, watch out for scams. Whether you are on Medicare, selecting a plan through the Affordable Care Act (ACA), or have private insurance, here are some tips to help you more safely navigate the open enrollment season. … Continue Reading

What is Criminal Identity Theft?

by Robert Siciliano

IDTheft

Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012, over 16.6 million Americans were victims of identity theft. What most people don’t know is that identity theft is much more than just stealing your credit card number. In other posts, I discussed how thieves use your identity to get free healthcare or your child’s identity to apply for credit. … Continue Reading

Fight Back! Stop Healthcare Fraud and Abuse From Happening to You!

by Linda Vincent R.N. P.I.

MedicalData

You trust in your physician to take care of you. You trust them to prescribe medications, diagnose symptoms when you’re sick, and help you maintain a healthy lifestyle. But is your physician doing something else—something nefarious—that you don’t know about? … Continue Reading

Student Cyber Fraud WiFi Risks

by Natalia Kuzma

Tech Devices

With the number of WiFi hotspots expected to reach 5.8 million by 2015[i], it is evident that the public’s demand for WiFi access is increasing rapidly. Accordingly, scammers are realizing that the public’s heavy WiFi usage presents the opportunity to commit fraud and are taking advantage of unsuspecting users. … Continue Reading

← Older Posts

More from our blog

Virus
This is what Spy Software looks like

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone was “tapped” – the device was inside the receiver. … Continue Reading

Malware-Virus 2
Scammers Use Facebook Tags to Spread Malware

If you use Facebook, watch out for suspicious posts tagged with dozens of names. This new scam is called “malicious tagging,” and it’s tricking victims into downloading malware. … Continue Reading

Wireless
Don’t be the Next Anthem

After Anthem Inc.’s most recent breach comprised more than 80 million customers’ information, 2015 is already shaping up to be the year of the healthcare data breach. Personal data incidents are on the rise and how an organization manages incident response affects their business risks and its brand. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo