Blog

BYOD: Beware of Your Own Device—and the People Who Carry Them

by ID Experts

MedicalData

Mobile devices allow you to do amazing things: play Candy Crush Saga in a boring meeting, download your alma mater’s fight song, get the calorie count of the Costco-sized pizza you bought. … Continue Reading

Your Medical Identity Is As Valuable As Your Financial Identity

by ITRC

Handwritten Insurance Claim Form with pen and calculator

By now, most consumers have at least heard of the dangers of identity theft. People may have even heard of the steps that are involved in trying to recover your good credit and your good name. … Continue Reading

Is Your Medical Device Putting You at Risk for Identity Theft?

by Linda Vincent R.N. P.I.

Medical Identity Theft

Many of us use medical devices to monitor a variety of health issues—everything from sleep apnea to heart conditions—to help keep us safe and sound. What many of us don’t realize is that these devices make us more vulnerable to medical identity theft and healthcare fraud. … Continue Reading

‘Side Effects’ of Affordable Care Act

by ID Experts

Medical Identity Theft

The list of side effects for many medications is long and somewhat frightening—anything from dizziness to fever to death. Side effects of the Affordable Care Act are equally troubling—including increased risk to data security and patient privacy—according to findings from the Fourth Annual Benchmark Study on Patient Privacy and Data Security by Ponemon Institute. … Continue Reading

ID Theft, Medicare Fraud Prevention in People Over 45

by Robert Siciliano

portrait of happy senior couple

My job as a security analyst is to educate people on the prevalence of ID theft, and this especially includes those over 45, and I also must point out that scams involving Medicare are on the rise. … Continue Reading

← Older Posts

More from our blog

Red triangular other dangers warning sign on white
Don’t Fall for Google Drive Phishing Scam

Sophisticated scammers have created a fake Google log-in screen that is actually hosted on the company’s servers. Watch out for scam Google Drive emails that prompt you to enter your username and password into this look-alike form. … Continue Reading

Airport Wi-Fi
How To Stop Criminal Hackers In Their Tracks

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Definition of fraud
Helping victims of the Washington State mudslide — Make sure your donations count

When disaster strikes, you can be sure that scam artists will be close behind. The latest example is the massive mudslide in Oso, Washington. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Proud to be a 2013 National Cyber Security Awareness Month (NCSAM) Champion

NCSAM-Champion

In partnership with:

stc logo