FTC Consumer Response Center 1-877-382-4357

Image

Archives

Image Source: Federal Trade Commission
Image Source: Federal Trade Commission

How To Protect Your Data Before You Get Rid of Your Computer

Your personal computer may have a lot of sensitive information on it. That could be financial information like your account numbers or tax returns.

Read The Original Article >>

Image Source: Federal Trade Commission

Image Source: Federal Trade Commission
Image Source: Federal Trade Commission

How To Recognize and Report Spam Text Messages

If you have a cell phone, you probably use it dozens of times a day to text people you know. But have you ever gotten a text message from an unknown sender?

Read The Original Article >>

Image Source: Federal Trade Commission

Image Source: SOS Daily News
Image Source: SOS Daily News

The War Against Ukraine Gives Online Charity Scams A Lucrative Boost

With every new crisis comes the opportunity to exploit it for personal gain. If nothing else, the coronavirus pandemic gave us an explosion of online scamming, bringing fraud crimes to historic heights.

Read The Original Article >>

Image Source: SOS Daily News

Image Source: SOS Daily News
Image Source: SOS Daily News

It's a Match! New Cryptocurrency Romance Scam Is Looking For Your Love

Scammers are at it again targeting the lovelorn by taking advantage of users. And of course, they are doing it in the most romantic way. They’re using a romance scam to coerce cryptocurrency payments and not to try to control hearts...

Read The Original Article >>

Image Source: SOS Daily News

Image Source: SOS Daily News
Image Source: SOS Daily News

More Pop-Up Ads? Yes Please! Said No One. Ever!

Those intrusive pop-up ads that slow down our browsers and bounce the content we want to read are by most accounts, insufferable. Knowing that, developers have created ad blocker extensions to help with this annoying and potentially harmful web surfing issue.

Read The Original Article >>

Image Source: SOS Daily News

Image Source: SOS Daily News
Image Source: SOS Daily News

Top Phishing Scams Continue To Improve And Grow

Much to our dismay, cybercrooks keep finding ways to better the phishing tools they have and find other ways to include new and sneakier methods of thievery.

Read The Original Article >>

Image Source: SOS Daily News

Image Source: KnowBe4
Image Source: KnowBe4

Reduce Your Chances of Getting Scammed

In today's connected world, nearly everyone has a story where they have been targeted by a scam and either that person or someone they know have lost money to scams. 

Read The Original Article >>

Image Source: KnowBe4

Image Source: KnowBe4
Image Source: KnowBe4

Phishing Emails Warn of a Suspicious Login From Russia

Researchers at Malwarebytes warn that a phishing campaign is informing users that someone logged into their account from an IP address in Moscow.

Read The Original Article >>

Image Source: KnowBe4

Image Source: SOS Daily News
Image Source: SOS Daily News

Credential Stuffers Compromise More Than 100K Accounts

Credential stuffing is a cyber-attack in which stolen user credentials and corresponding passwords are used with brute force to make automated login requests. The stolen user credentials are typically from data breaches that could have happened recently...

Read The Original Article >>

Image Source: SOS Daily News

Image Source: SOS Daily News
Image Source: SOS Daily News

Storing Passwords In Your Browser…It’s Convenient, BUT Very Risky Too

Most of us know that password fatigue can lead to security mishaps and that creating a safe and secure entrance into our personal or work accounts can be a real challenge. Fortunately, security experts also know that safe password use has long been a problem...

Read The Original Article >>

Image Source: SOS Daily News

Image Source: SOS Daily News
Image Source: SOS Daily News

BlackByte Ransomware Decryptor Key Returns Data, Foils Ransom Payments

The news is ransomware continues to be a growing threat against industry, critical infrastructure, and individuals alike. Holding data hostage for a ransom can cripple even the biggest of victims and bring their goods and services to a grinding halt until the ransom demand is paid.

Read The Original Article >>

Image Source: SOS Daily News

Image Source: SOS Daily News
Image Source: SOS Daily News

Sign-In Without A Password? The Pros And Cons Of The Alternatives

Let’s be honest, using strong and unique passwords for every online account can be a frustrating, cumbersome, and time-consuming effort. Being human, the temptation to reuse passwords across multiple accounts surely exists.

Read The Original Article >>

Image Source: SOS Daily News