FTC Consumer Response Center 1-877-382-4357

Image

Other Articles

Image Source: SOS Daily News
Image Source: SOS Daily News

T-Mobile Breach Affects 37 Million Customers - 8th Breach in 5 Years

On January 19, 2023, T-Mobile released an official statement that clearly identified a security breach that affected millions of consumers. It appears to have ongoing starting on November 25, 2022 and continuing right up to January, as reported in the company’s SEC filing.

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

Online Banking Risks – How Financial Institutions And Customers Partner For Better Security

If you think about it, the financial services sector has gone through significant changes since horse-drawn wagons delivered money to banks. Long after that, in-person visits to your local branch gave way to online banking on devices, both mobile and at home.

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

Do Not Get Fooled Twice: Mailchimp's Latest Breach Raises Alarm Bells – Protect Yourself Now!

For the second time in less than a year, Mailchimp has found itself in a precarious situation, having to admit that it has been breached. It appears that a social engineering attack tricked Mailchimp employees and contractors into giving up their login credentials, which were then used to access 133 Mailchimp accounts.

 

Read The Original Article >>

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

What to Do if Your Password Manager Is Breached

For instance, many LastPass users scrambled in December of 2022 because of news that the company has been breached several times. What should you do if your password manager is breached? Does this mean all your passwords are out there being sold on the Dark Web?

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

Unusual Blank-Image Phishing Attacks Impersonate DocuSign

An unusual phishing technique has surfaced this week. Avanan, a Check Point Software company, released a blog Thursday morning detailing a new attack in which hackers hide malicious content inside a blank image within an HTML attachment in phishing emails claiming to be from DocuSign.

 

Read The Original Article >>

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

Online Romance and Dating Scams

Roses are red, violets are blue, and we all know that not everything – or everyone – online is true. But can you tell the difference between someone who is simply using a decades-old photo and a lothario scammer trying to swoon their way to every dollar in your bank account?

 

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

Watch Out For This Tricky New Tactic Called Clone Phishing

Researchers at Vade Secure describe a type of phishing attack dubbed “clone phishing,” in which attackers follow up a legitimate email from a trusted sender with a replica, claiming that they forgot to include a link or attachment.

 

 

Read The Original Article >>

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

Manage Your Privacy Settings

Want to view or change your privacy/security settings, but don’t know where to find them? Use these direct links to update your privacy settings on popular devices and online services or read about your platforms’ privacy policies and statements.

 

 

 

Read The Original Article >>

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

Vacation and Travel Security Tips

As you embark upon your next adventure, remain cyber safe following some simple practices to keep your vacation plans free from cybercriminal meddling. 

 

 

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

How To Stop Job Scams

I am reading and hearing about a ton of job scams these days. So many, I wondered how anyone could get a real job or employee, especially in these days of often full-time, work-from-home (WFH) environments

 

 

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

Tips for Securing Your Mobile Devices

Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information.

 

 

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

How To Protect Yourself After A Data Breach

Data breaches seem to happen like clockwork. None of them are your fault, but the responsibility to protect yourself and your personal information rests square on your shoulders. It can seem like a daunting task, but there are some fundamental actions that can be taken right now that can make you a significantly safer from falling victim to a cyberattack.

 

 

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

Cybercriminal Gets 25 Years Prison Time Over Romance Scams and Business Email Compromise Attacks

A man from Atlanta, Georgia has been convicted of running romance scams and business email compromise attacks that netted him over $9.5 million, the US Justice Department has announced.

 

 

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

How Your Instagram and Facebook “Friends” Can Steal Your Social Media Account

It’s time to resurrect the old adage “With friends like these, who needs enemies?” Thanks to the nonprofit Identity Theft Resource Center (ITRC), their work has uncovered a social media hack victimizing users of Facebook and Instagram using friendship as a lure.

 

 

 

Read The Original Article >>

Scams, Scams, Everywhere!

Scammers have been around as long as history has been recorded. Think about the famous ‘Trojan Horse’ for example. A perfect scam that allowed attackers to get behind the city walls. The same is still happening, although the technology has evolved from wooden horses to digital ones.

 

 

 

Read The Original Article >>

Image Source: Federal Trade Commission
Image Source: Federal Trade Commission

Five things to do to protect yourself online

Your online accounts, computer, and phone hold a lot of your personal, financial, and health information. Information that’s valuable to you — and to scammers who try to steal it. Here are five things to do to keep hackers out of your accounts and your personal business.

 

 

Read The Original Article >>