Blog

What is Business or Corporate Identity Theft?

by Robert Siciliano

Overworked

Business or corporate identity theft occurs when a thief uses an existing business’ name to obtain credit, or bills a business’s legitimate clients for products and services. Often, but not always, a Social Security Number of a company officer is required to commit business identity theft. Other identifiers, such as Federal IDs or Employer’s Identification Numbers … Continue Reading

Small Business Fraud: An Ounce of Fraud Prevention

by Amy Pennock CFE

handusingmouse

The old clichés go, “an ounce of prevention is worth a pound of cure”, and “an apple a day keeps the doctor away “and “a stitch in time saves nine”.

When it comes to running a business, watching the bottom line often conflicts with an ounce of prevention. Business owners are just trying to survive, stay afloat and keep paying their employees.

While times are tight and you do care about the ounce, here are a few tips to prevent fraud in your business: … Continue Reading

Protecting Your Customer Data from Hackers

by Robert Siciliano

DataTheft

Criminal hackers hack for fun, fame, revenge, trade secrets, or terror, but mostly they hack for financial gain. According to a data breach study, based on 75 incidents in the second half of 2010, 13% of web hacking cases involved leaked client data leading to financial fraud. (The top two reasons hackers attacked websites were site defacement at 15% and site downtime at 33%.) … Continue Reading

Small Business Fraud: Insider Medical Insurance Fraud

by Barry Zalma, Esq., CFE

doctorwithpaperworkstress

Phuong Nguyen, a/k/a “Lisa,” 33, a Quincy, Massachusetts woman was sentenced to 46 months in prison for embezzling several hundred thousand dollars from multiple area dentists. U.S. District Judge George A. O’Toole Jr. sentenced Nguyen, to 46 months in prison, to be followed by three years of supervised release. He also ordered Nguyen to pay $378,624 … Continue Reading

Newer Posts →

More from our blog

ribbons Article.jpg
Beware Disaster Related Fraud and Scams

The Boston and Texas tragedies remind us that when disaster strikes, we are not always prepared to deal with the magnitude of the chaotic wake that follows such events in our communities … Continue Reading

Red triangular other dangers warning sign on white
Fake Scanner Emails Infect Office Computers

Scammers are taking advantage of the standard emails sent by most office scanners. They have replicated the messages of famous printer brands but attach malware to the emails instead of documents.

How the Scam Works:

You are at work, and you receive a message from what you think is your office printer/scanner. It appears that someone sent you a copy of a scanned document. The name doesn’t ring a bell, but you open the attachment anyway.

When you click on the file, you find that it isn’t a scanned copy of the latest office report. It’s really a link to a third-party website that will download a virus to your computer. These viruses phish for personal and banking information on your machine. … Continue Reading

Credit card background, shallow DOF
Unknown Credit Card Charges: Fraud or Legit?

Recently, my mother-in-law discovered that a pretty significant piece of jewelry had gone missing. There had been a number of construction workers in the house for a few weeks and when she went to get her jewelry, it was gone. After searching like a crazy person under/in/on top of everything, she called the police.

When the police arrived they asked a bunch of questions, did an onsite investigation and calmly and collectively stated to her: “You misplaced it. It probably hasn’t been stolen. You will find it in a few days.” … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading