It starts with an email from Amazon and likely ends with “You’ll need an Amazon Gift Card to pay.” In addition to Amazon Gift Cards,  iTunes, Walmart, and others gift cards are used for all types of email scams. Many unwilling consumers fall prey to expertly faked emails from …

Continue reading

Protecting your login credentials can get a bit tricky.  There are smartphones, the work computer, the laptop, the tablet, and occasionally the public computer. Logging on multiple devices to perform tasks such as checking email and performing banking transactions leaves us a bit more vulnerable to having our credentials stolen …

Continue reading

After a major data breach, many people consider freezing their credit reports. It’s not a bad idea, if you don’t need access to your credit right away. It can give you peace of mind if someone does get a hold of your social security number or other information …

Continue reading

If you have a mobile device, you have probably made use of Bluetooth technology. Bluetooth can helps us do things like connect to wireless headsets, wireless keyboards for or computers, connect our mobile phones to our vehicles’ infotainment systems, and even use a digital key to unlock hotel room doors …

Continue reading

It has been reported that 143 million United States (U.S.) consumers have been affected by the most recent breach involving the credit-reporting agency, Equifax. In response to this breach, Equifax has created a website that allows a consumer to enter the last six digits of their social security …

Continue reading

There are a lot of scams being perpetrated by the unscrupulous wanting to make a buck. Many of them are surprisingly simple to pull off and therefore, persist and evolve over time and to keep up with current events. With the recent weather patterns depositing massive amounts of wind and …

Continue reading

Currently, your Automated Clearing House (ACH) payments may take up to three business days to post to your account. However, the three-day wait-time is about to change. To increase the speed of ACH payments, NACHA, the Electronic Payments Association has adopted new rules to be implemented in three …

Continue reading

There is a lot of talk about avoiding becoming a victim of malware.  But, how do you know and what do you do if your computer is compromised? Below are some signs that you have been infected with malware. Some are less serious, like unwanted browser tool bars appearing and …

Continue reading

It’s being reported that while financial institutions were formerly on a downward trajectory with respect to malware attacks, it has since changed. These organizations are reporting an uptick in malware sightings and they are not limiting their targeted currencies to the traditional. Crypto-currencies are also in the crosshairs …

Continue reading

Almost everything you can do from a computer these days can be accessed via a web browser. You just enter a URL address in the address bar and off you go. Because web browsing is such a big part of the online world these days, it’s important to be …

Continue reading