Blog

Beware Disaster Related Fraud and Scams

by Robin Slade

ribbons Article.jpg

The Boston and Texas tragedies remind us that when disaster strikes, we are not always prepared to deal with the magnitude of the chaotic wake that follows such events in our communities … Continue Reading

Don’t Let Them Call You Sweetheart

by J_Pratt

heart.jpg

Among the most painful scams are those in which the victim believes the villain truly cares for them. This connection allows the miscreant to exploit their affection, abusing them financially as well as emotionally. These are known as Romance or Sweetheart scams. … Continue Reading

Most Popular 2012 Passwords Revealed

by FBI IC3

iStock_000011533270XSmall

SplashData.com recently published the following information regarding the most popular 2012 passwords on the web. The ranking was based on password information from compromised accounts posted by hackers online. The article was also featured on blogs.avg.com.

This year, the list is back! So it’s time to see how, if at all, users have learned their lessons about what makes a strong password. … Continue Reading

What’s on Your Phone? A Lot More Than You Realize!

by Robert Siciliano

MobileApplications

It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer.

Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. Carriers are announcing that they’ll be upping the speed of the latest version of their networks, doubling download speeds. … Continue Reading

Credit Card Fraud Really Isn’t Identity Theft

by Robert Siciliano

Credit card background, shallow DOF

With the holiday shopping season and after holiday season sales over, it’s time to review our credit card statements and make sure that everything that is on there was something you purchased. With most of us using our card a lot more during this time, there’s more chance of fraud or identity theft.

When most of us think of identity theft and being a victim of identity theft, we are really referring to credit card fraud. This form of credit card fraud is called account takeover and it occurs when a thief gains access to your credit or debit card number … Continue Reading

← Older Posts

More from our blog

Sad Girl on Computer
Were You Unwittingly in the “Zombie” Army that Attacked the Internet?

The powerful attack on the Internet last week raised many questions — who did it? how did it happen? and could it happen again? Some of those answers are still unknown and could be for awhile. But what is known is that the Internet attack involved millions and millions of computers around the world. And we’re learning that not all of the computers involved are those of companies — some of the computers used, as well as other devices, are ones in people’s homes.

Nicole Perlroth outlined these disturbing facts in a recent New York Times article (see, “Devices Like Cable Boxes Figured in Internet Attack”; page B1, March 30th). … Continue Reading

Red triangular other dangers warning sign on white
FRAUD ALERT: Fake Employment Agency Fools Job Hunters with Scam Calls

The BBB is dedicated to fostering honest and responsive relationships between businesses and consumers in the U.S. and Canada, instilling consumer confidence and contributing to a trustworthy marketplace for all. … Continue Reading

computer-stethoscope.jpg
Prevention vs. Cure: Facing the Worst-Case Scenario

There’s an old saying: “There’s no such thing as bad PR.” Well, it’s not true, at least where healthcare is concerned. While starlets and bloggers may thrive on scandal and controversy, consumers look to their healthcare providers for reliable, quality care and privacy. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading