Blog

BYOD: Beware of Your Own Device—and the People Who Carry Them

by ID Experts

MedicalData

Mobile devices allow you to do amazing things: play Candy Crush Saga in a boring meeting, download your alma mater’s fight song, get the calorie count of the Costco-sized pizza you bought. … Continue Reading

How To Stop Criminal Hackers In Their Tracks

by Robert Siciliano

Airport Wi-Fi

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. … Continue Reading

Ways small businesses are preventing Breaches

by Robert Siciliano

DataTheft

How did that huge recent data breach of a major retailer occur in the first place? Well, valuables can’t be stolen if there aren’t any valuables to begin with. Large merchants will store customers’ credit/debit card data to facilitate faster transactions. But small retailers keep minimal or zero data—this will not attract thieves. … Continue Reading

A Work At Home Opportunity That’s Not So Golden

by Federal Trade Commission

WirelessInternetRouter

Looking to make some extra cash? So are scammers. Listen to this one about a telemarketing resale scam targeting Spanish-speakers nationwide. … Continue Reading

11 Data Security Tips to Immunize Your Health Care Organization

by ID Experts

MedicalData

According to the Chinese zodiac, 2013 is the Year of the Snake. I predict that 2013 will be the Year of the Data Breach, at least in healthcare. According to the newly released Third Annual Benchmark Study on Patient Privacy & Data Security by Ponemon Institute, 94 percent of healthcare organizations surveyed suffered data breaches. … Continue Reading

← Older Posts

More from our blog

IDTheft
Family Identity Theft is Ugly

Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft. … Continue Reading

ComputerVirus
Losing Control of Your Android Smartphone to Hackers

A few years ago, hackers in Eastern Europe came up with malware – malicious software – that was designed to self-install on computers and make them unusable. Computer users would see a screen that told them they would have to pay a ransom in order to have the use of their computer returned to them. … Continue Reading

Red triangular other dangers warning sign on white
Jamaican Lotto Scam Dupes US & Canadian Victims

Beware of calls from area code (876). The area code is used by scam artists claiming to be representatives of the Jamaican lottery.
Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading

Sign-Up For Our eNewsletter

Support FraudAvengers by Shopping at AmazonSmile

When you shop at AmazonSmile, you’ll find Amazon's same prices and selection and a portion of your purchase price will be donated to FraudAvengers – at no additional cost to you.

 

Visit AmazonSmile.com and choose “Foundation for Payments Fraud Abatement & Activism” as your preferred charity. 

In partnership with:

stc logo