Beware of Phone and Mail Scams

Scammers Still Call & Mail Victims

With the increasing numbers of connected devices, social media platforms and other digital services, we’ve become accustomed to the threats that target us online. But two not-so-new phone and mail scams prove that fraudsters are still using traditional scamming methods to facilitate their crimes.

Unfortunate but true, our Resolution Center gets calls about phone and mail scams all the time. This new wave of malicious phone and mail scams reminds us just how effective traditional social engineering and scare tactics can be. Continue reading

Stay Smart About Fake Smartphone Apps

Fraudsters go mobile 

Our smartphones send, receive and store tons of sensitive information about us. This includes the information-rich apps we have on our devices. 

With over 6 million apps to choose from across Apple, BlackBerry, Amazon, Android and Windows, a smartphone can virtually perform any function and can hold as much (or more) data as a full-sized computer. 

Of course, criminals will do what it takes to get that data. 

Fraudsters are taking advantage of the fact that many have shifted to mobile services, specifically mobile banking. If you’re like 77 percent of the U.S., you probably own a smartphone and use a number of apps available for your device.

Let’s explore why criminals are turning to fake smartphone apps, how they can exploit those apps to commit identity crimes, and ways to help you safeguard your personal information from these identity crime schemes.

Continue reading

Researchers Discover Vulnerability in Mac Computers

Mac Vulnerability

What happened?

Macintosh security researcher Pedro Vilaca, discovered a deeply rooted vulnerability that allows hackers to gain access to certain Mac computers. By exploiting this security flaw, cybercriminals can effectively shut down your device or spy on your activities for a prolonged period of time.

Spying on users who are engaging in online banking activities or accessing sensitive data from their computer can put them at risk of identity theft and fraud. Some believe hackers may target major organizations in an effort to obtain confidential business information, similar to the Sony hack.

Symantec, a leader in data security, has since confirmed this Mac vulnerability and rated it as a “critical” threat.

Continue reading