Blog

Don’t Rely on the Password Reset

by Robert Siciliano

iStock_000011533270XSmall

Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on your previous vacations. Now, imagine you have a keychain full of these keys that all look the same, but each only opens a specific door. … Continue Reading

Password Selection, Protection & Management

by Robin Slade

Picking Strong Passwords

There’s not much you can’t do today using your computer or mobile phone. You can work, shop, bank, book travel, play games, schedule appointments, meet your soul mate, make your restaurant reservations, set your fantasy football lineup (go Gizzards!), converse with your friends via Facebook, bid on a potato chip with a burnt silhouette of Ringo Starr… you know what I mean. … Continue Reading

Coming up, Your Phone contains your Driver’s License

by Robert Siciliano

Virus

Gone are the days of the fat wallet bursting at the seems, since smartphones can now contain most anything that a wallet does—except the driver’s license. But don’t write that possibility off just yet. … Continue Reading

Public Wi-Fi Networks

by Federal Trade Commission

Airport Wi-Fi

Whether in a hotel or airport across the world, or in the coffee shop just down the street, chances are you’ve used free Wi-Fi hotspots. While convenient, they’re often unsecure. So how can you reduce your risk? Encryption — having your information scrambled into code — is key to staying secure online. … Continue Reading

How to Avoid Bad Apps

by Robert Siciliano

Social Media Apps

If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems.

In fact, out of the top 25 most popular apps, 18 of them bombed on a security test from McAfee Labs recently. … Continue Reading

← Older Posts

More from our blog

Red triangular other dangers warning sign on white
Scammers targeting victims through Instagram

Millions of consumers use Instagram to look through their friends’ vacation photos and post selfies. Unfortunately, scammers follow social media trends too and they’ve made Instagram another tool in their arsenal of tricks to try and defraud consumers. … Continue Reading

DataTheft
Latest Scam Follows a Big Data Breach

There seems to always be a data breach in the headlines – so what’s the latest scam making news these days?

Consumers need to be aware of phishing scams following a big data breach. Cyber criminals can use information they have just stolen to phish for even more information.
Continue Reading

Scam
Scammers Impersonate the Police

We know scammers are out there, impersonating the authorities and conjuring up different schemes to fool people into giving them money. They might say they’re calling from the IRS because you owe taxes. Or claim they’re from the FTC, calling to help you recover money lost to a scammer. But now we’re hearing about a new ploy: scammers are impersonating the police! That takes some chutzpah, huh? … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter