Blog

Small Businesses Need to Protect their Data

by Jim Malmberg

DataTheft

When we talk about data breaches, every one tends to think of large companies or organizations. Target, Home Depot and the Veterans Administration come to mind almost immediately. But hackers are now targeting small companies too. One reason for this may be that smaller businesses don’t have the same number of resources to invest in data protection and are consequently easier targets. … Continue Reading

BYOD: Beware of Your Own Device—and the People Who Carry Them

by ID Experts

MedicalData

Mobile devices allow you to do amazing things: play Candy Crush Saga in a boring meeting, download your alma mater’s fight song, get the calorie count of the Costco-sized pizza you bought. … Continue Reading

How To Stop Criminal Hackers In Their Tracks

by Robert Siciliano

Airport Wi-Fi

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Ways small businesses are preventing Breaches

by Robert Siciliano

DataTheft

How did that huge recent data breach of a major retailer occur in the first place? Well, valuables can’t be stolen if there aren’t any valuables to begin with. Large merchants will store customers’ credit/debit card data to facilitate faster transactions. But small retailers keep minimal or zero data—this will not attract thieves. … Continue Reading

A Work At Home Opportunity That’s Not So Golden

by Federal Trade Commission

WirelessInternetRouter

Looking to make some extra cash? So are scammers. Listen to this one about a telemarketing resale scam targeting Spanish-speakers nationwide. … Continue Reading

← Older Posts

More from our blog

Virus
This is what Spy Software looks like

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone was “tapped” – the device was inside the receiver. … Continue Reading

Malware-Virus 2
Scammers Use Facebook Tags to Spread Malware

If you use Facebook, watch out for suspicious posts tagged with dozens of names. This new scam is called “malicious tagging,” and it’s tricking victims into downloading malware. … Continue Reading

Wireless
Don’t be the Next Anthem

After Anthem Inc.’s most recent breach comprised more than 80 million customers’ information, 2015 is already shaping up to be the year of the healthcare data breach. Personal data incidents are on the rise and how an organization manages incident response affects their business risks and its brand. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo