Blog

CYBERBULLYING & HARASSMENT

Cyberbullying can range from embarrassing or cruel online posts or digital pictures, to online threats, harassment, and negative comments, to stalking through emails, websites, social networks and text messages.

by Stay Safe Online

cybercrime

Every age group is vulnerable to cyberbullying, but teenagers and young adults are common victims. Cyberbullying is a growing problem in schools. Cyberbullying has become an issue because the Internet is fairly anonymous, which is appealing to bullies because their intimidation is difficult to trace. Unfortunately, rumors, threats and photos can be disseminated on the Internet very quickly. … Continue Reading

What is Shoulder Surfing?

by Robert Siciliano

Identity Theft in Progress

The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be trying to capture your login information so they can use it to access your accounts impersonating you later on. … Continue Reading

Your top 5 questions about unwanted calls and the National Do Not Call Registry

by Federal Trade Commission

hanging up phone

You signed up for the Do Not Call Registry ages ago, but you’re suddenly getting a bunch of unwanted calls. What can you do? … Continue Reading

Become a Champion – Support Fraud Prevention Education

by the FraudAvengers Founders

ribbons Article.jpg

With our growing success, hard dollar operating costs are also increasing. FraudAvengers is asking for your financial help to allow us to serve the needs of our expanding readership. … Continue Reading

Keyloggers log wirelessly

by Robert Siciliano

Virus

Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to the gadget’s owner over the Internet. … Continue Reading

← Older Posts

More from our blog

Scam
Don’t Fall for Fake Weight Loss Products’ Promises of Fitness

Watch out for the clever tricks scammers are using to sell phony weight loss products. Con artists create fake emails and news websites to lure in buyers, according to reports from the US Federal Trade Commission. … Continue Reading

IDTheft
Recovering from identity theft is easier with a plan

Hollywood might have you believe that identity theft means a dozen maxed out credit cards, a warrant for your arrest, and a bill for a spa appointment 2,000 miles away. But in real life, identity theft can be sneakier. … Continue Reading

Identity Theft in Progress
What is Shoulder Surfing?

The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be trying to capture your login information so they can use it to access your accounts impersonating you later on. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter