posts category

Security

Medical identity theft generally occurs when a thief uses your name and health insurance numbers. In most cases the criminal will use this information to see a doctor, file claims with your insurance provider, get prescription drugs or get other medical services. The most concerning problem with medical identity theft …

Continue reading

The online auction and e-commerce website eBay is often used in phishing scams. In a recent one, an email claims that shoppers owe hundreds of dollars for a purchase that is obviously incorrect and will probably cause an initial gasp. But don’t despair. The scammers are there to …

Continue reading

As you’re shopping for your last minute holiday goodies, keep an eagle eye out for counterfeit goods. According to the Global Innovation Policy Center (GPIC), counterfeiting has nearly doubled in the last six years and now amounts to $461 billion. It also costs the United States around three-quarters …

Continue reading

Cyber scammers don’t take any time off for the holiday season. In fact, they’re working overtime to take advantage of the spirit of giving. Giving to them, that is. By now consumers know that packages left outside their homes are up for grabs by package thieves.  The latest …

Continue reading

Let’s talk about popups for a moment. These annoying little boxes that appear on our screens when we are simply just trying to perform a task can be quite taxing on our nerves. We just want them to go away so we can get back to our shopping, watching …

Continue reading

The holidays are a time for cheer and a time for giving. And “Giving Tuesday” was earlier this week; which is a day promoted as a time to give to charity and non-profit groups. Events like this bring out human empathy and the desire to help those less fortunate …

Continue reading

Scammers truly won’t give up. That’s because once they find something that works, it  can result in a significant payoff. Recently, some of them have figured out how to trick Apple iOS users into giving up their iCloud passwords. And it is a surprisingly simplistic attack. It …

Continue reading

Cyber criminals will use whatever they can think of to try to get your online banking credentials or other information they can sell on the dark web. Here are five ways they use social media to do it and how you can avoid giving up your information, in no particular …

Continue reading

A researcher from a university in Belgium has discovered a weakness that can be exploited in nearly all Wi-Fi routers. It is cleverly being referred to as KRACK, which is an acronym for “key reinstallation attacks.” Suffice it to say, that anyone using a Wi-Fi connection is vulnerable …

Continue reading

It starts with an email from Amazon and likely ends with “You’ll need an Amazon Gift Card to pay.” In addition to Amazon Gift Cards,  iTunes, Walmart, and others gift cards are used for all types of email scams. Many unwilling consumers fall prey to expertly faked emails from …

Continue reading