Blog

Teachable Moments in Identity

by ITRC

Boy on computer

As parents we start teaching our kids the basics of how the world and everything in it work. The Cow goes Moo, the sky is blue, keep your identity true. This suggestion may feel like it goes a bit too far, but does it really? One of the new basics should be helping our children to understand what their identity truly is. … Continue Reading

Google Now Allows Gmail Users to Spy on Email Recipients

by Jim Malmberg

inbox

Tracking how people respond to email messages is nothing new. In fact, the sender of virtually every commercial email message you read gets aggregate tracking information on the messages they send. They know how many messages were sent, how many were opened and how many people clicked through on any links in the messages. … Continue Reading

Online Degree Scams: Beware of Degree and Diploma Mills

by Natalia Kuzma

handusingmouse

Today, technology is utilized and embraced globally.

The Internet alone has become a tool that allows users to research, invest, communicate, edit and share files, and earn an income, among other things. … Continue Reading

How do I protect Myself engaged in the Internet of Things?

by Robert Siciliano

Tech Devices

The Internet of Things—IoT—is a formal term referring to distinctly identifiable objects (cars, kitchen appliances, smartphones) and their cyber-representations on the Internet. … Continue Reading

A Work At Home Opportunity That’s Not So Golden

by Federal Trade Commission

WirelessInternetRouter

Looking to make some extra cash? So are scammers. Listen to this one about a telemarketing resale scam targeting Spanish-speakers nationwide. … Continue Reading

← Older Posts

More from our blog

computer w lock
Beware of Rich Text “Poisened” Files

This is a “heads up” for people who use Rich Text (RTF) files. Brad Chacos reported recently that hackers are using “poisoned” RTF files to gain control of consumers’ PCs (www.csoonline; “Just previewing email can give attackers control of your PC, Microsoft warns”; March 25, 2014). … Continue Reading

Red triangular other dangers warning sign on white
Don’t Fall for Google Drive Phishing Scam

Sophisticated scammers have created a fake Google log-in screen that is actually hosted on the company’s servers. Watch out for scam Google Drive emails that prompt you to enter your username and password into this look-alike form. … Continue Reading

Airport Wi-Fi
How To Stop Criminal Hackers In Their Tracks

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Proud to be a 2013 National Cyber Security Awareness Month (NCSAM) Champion

NCSAM-Champion

In partnership with:

stc logo