What happens when you pass away or there’s an emergency that leaves you incapacitated, and family members need to access your mobile devices, computers, emails and social media accounts? Have you documented this important information? Here are some tips:
One of the most common problem I encounter investigating a cybercrime is that the reporting person and/or victim fail to provide any records and/or documentation to support their claim that they had been victimized — more so in cases involving online fraud. One of the simplest and quickest methods of documentation is printing out the webpage offer, sale or service.
It may be hard to believe, but even during the coronavirus pandemic, criminals are targeting and preying upon the public via phony websites, bogus emails and text messaging, and by phone.
How do you know that you are the target of a scam? Here are some red flags that you should be aware of…
Before trading in or selling your mobile devices, cellphones or tablets, be sure no sensitive data is left behind that may put you in jeopardy. Here are a few basic steps to reduce the risk of being victimized.
If you want to make a donation, first go online and research the charity. Check the Better Business Bureau or the Federal Trade Commission for any scams or complaints connected to the organization. Scammers attempt to fool you into thinking they are a legitimate, so before donating, verify that the URL and email address are correct.
When purchasing items with a credit or debit card online or over the counter, there are precautions you need to take.
How often do we get and answer calls from telephone numbers of people who we think we know, only to discover it’s a telemarketer or scammer? Here are some prevention tips that may help…
There’s been a marked increase in text messages with a spoofed Caller ID that ask the recipient to click on a hyperlink — that’s always the objective of this type of scam. It is their methodology to hijack your device. Two Major Risks include: The recipient does not know who really sent the message; and the hyperlink may redirect the message recipient to a website where malicious software may compromise the recipient’s cellphone.
To create secure passwords, you generally want to set the minimum password length to at least eight characters, but a minimum length of 14 characters is better.
At the start of a new year, many of us make a New Year’s resolution to get healthy. Did you make a resolution to start the year with a “healthy” computer, too? Here are some computer health tips…
With all the natural disasters happening throughout the world, unscrupulous scammers are looking to take advantage of our empathy and generosity as we seek ways to help the victims of those disasters. These scammers will be soliciting donations using telephone messages, emails, and even social networking services like Facebook.
One of the trending online fraud schemes involves being contacted by either friends or relatives via email or through social networking services like Facebook about receiving large amounts of money through investments, a class action lawsuit, or even a random contest drawing. However, these “friends” or “relatives” are NOT who they claim to be.
Telephone scams have been around for years, even before the birth of the internet, and they are just as dangerous as their online counterparts. Because modern telephone networks use digital technology, it is easy for cybercriminals to manipulate what appears in the Caller ID to trick you into thinking you are receiving a call from a trusted source. This tactic is called “spoofing.”