Blog

“Digital IQ Initiative”

by Debra N. Diener J.D. CIPP G

cybercrime

Consumers are increasingly online doing all kinds of transactions. These transactions often involve sharing personal and private information. Yet consumers might not be fully aware of how that personal and private information is being used and/or ways in which they could better protect themselves. … Continue Reading

WiFi world wide a Big Security Issue

by Robert Siciliano

Airport Wi-Fi

Do you access your various financial or social media accounts, or other private accounts such as e-mails with your doctor, at public computer stations? At the coffee house or hotel, for instance? Boy, are you ever setting yourself up for cybercrime including identity theft. … Continue Reading

A scam-free vacation

by Federal Trade Commission

Tropical Resort View

Heading out of town? Make sure you come back with a nice post-vacation glow and not a case of identity theft. Here are some things you can do to lessen the chances you’ll be a victim. … Continue Reading

Top 6 Tips for Using Mobile Devices for Financial Services

by Debra N. Diener J.D. CIPP G

iStock_000014436196Small

The Consumer Financial Protection Bureau (CFPB) knows that more and more consumers are using mobile devices for accessing financial services, transacting banking and other financial activities and managing their personal finances. … Continue Reading

Snap. Chat. Delete?

by Federal Trade Commission

Social Media Apps

Come on, admit it: Ever since you saw Mission: Impossible, you’ve wished you could send messages that self-destruct. Then Snapchat came along, and suddenly the impossible seemed easy. … Continue Reading

← Older Posts

More from our blog

IDTheft
Family Identity Theft is Ugly

Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft. … Continue Reading

ComputerVirus
Losing Control of Your Android Smartphone to Hackers

A few years ago, hackers in Eastern Europe came up with malware – malicious software – that was designed to self-install on computers and make them unusable. Computer users would see a screen that told them they would have to pay a ransom in order to have the use of their computer returned to them. … Continue Reading

Red triangular other dangers warning sign on white
Jamaican Lotto Scam Dupes US & Canadian Victims

Beware of calls from area code (876). The area code is used by scam artists claiming to be representatives of the Jamaican lottery.
Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo