IRS Phone Scam Surges

Did you know that nearly 3000 victims have lost over $14 million to IRS phone scams? Read more to learn how to protect yourself.

Cyber Attack Impacting Anthem

Anthem insurance was the victim of a highly-sophisticated cyber-attack. Since disclosed, it has been released that Indiana residents who may have been impacted by the cyber-attack against Anthem should be aware of scam email campaigns targeting current and former Anthem members. Read more about the scam here. (PDF)

February 11th Anthem Update: Anthem is offering two years of free identity protection services. Please go to www.AnthemFacts.com to learn how to enroll.

FFIEC Business Account Guidance

Risk Assessment & Layered Security for Online Business Transacations

New financial standards will assist banks and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds transfers. (PDF brochure)

FFEIC Consumer Guidance

Important Facts About Your Account Authentication
& Online Banking

Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their customers. (PDF Brochure)

Fighting Spyware

Spyware is software that collects personal information without your knowledge or permission. You might be the target of spyware or other unwanted software if you download music from file-sharing programs, free games from sites you don't trust, or other software from an unknown source. Learn more about the symptoms of spyware and other unwanted software and how you can help to protect your computer. (visit the Microsoft website)

Lavasoft's Adware

With its ability to scan your RAM, Registry, hard drives, and external storage devices for known data mining, advertising, and tracking components, Ad-aware can easily rid your system of these tracking components, allowing you to maintain a higher degree of privacy while you surf the Web. (Visit the Lavasoft website)

Spybot Search and Destroy

Spybot - Search & Destroy can detect and remove a multitude of adware files and modules from your computer. For advanced users, it allows you to fix Registry inconsistencies related to adware or malicious program installations. While not as "user-friendly" as Lavasoft's AdAware (see above), this program appears to be more thorough. (Visit the the Safer Networking website)

FTC Names Its Dirty Dozen

Email boxes are filling up with more offers for business opportunities than any other kind of unsolicited commercial email.  That's a problem, according to the Federal Trade Commision (FTC), because many of these offers are scams.  The FTC has identified the 12 scams that are most likely to arrive in consumers' email boxes. (PDF)

Privacy: What You Do Know Can Protect You

Our economy generates an enormous amount of data. Most users of that information are from honest businesses—getting and giving legitimate information. Despite the benefits of the information age, some consumers may want to limit the amount of personal information they share. And they can: More organizations are offering people choices about how their personal information is used. For example, many feature an “opt-out” choice that limits the information shared with others or used for promotional purposes. When you “opt-out,” you may cut down on the number of unsolicited telemarketing calls, promotional mail and spam emails that you receive. Learn more about the options you have for protecting your personal information by contacting the following organizations. (PDF)

Consumer Safety Tips for Online Banking

Fair Isaac’s CardAlert Fraud Manager Team recently reported on the presence of POP-UP window scams (see Issue 04.05) that were designed by computer hackers to steal the personal information of consumers who perform banking and various other commerce related activities online. The positive feedback received from Issue 04.05 prompted the creation of the following list of online banking safety tips for consumers. Many of these online safety tips have been created based upon our experience with the abundance of counterfeit debit card cases that are originating from internet related attacks all over the United States. (PDF)

Email Address Harvesting

Is your in-box clogged with junk email messages from people you dont know? Are you overwhelmed by unsolicited email offering products or services you dont want? It's no wonder. According to research by the Federal Trade Commission (FTC) and several law enforcement partners, its harvest time for spammers. But, the consumer protection agency says, the good news for computer users is that they can minimize the amount of spam they receive. (PDF) View some simple suggestions from the FTC

How Not To Get Hooked By A 'Phishing' Scam

Internet scammers casting about for peoples financial information have a new way to lure unsuspecting victims: They go "phishing". Phishing, also called "carding", is a high-tech scam that uses spam to deceive consumers into disclosing their credit card numbers, bank account information, Social Security numbers, passwords, and other sensitive information. See the FTC Consumer Alert: Is Someone "Phishing" for Your Information?

How Stop Pop Up Spam

According to the Federal Trade Commission (FTC), the nation’s consumer protection agency, you can block unwanted pop up messages and better protect your computer from hackers. It’s as simple as turning off the Microsoft Windows feature that allows pop up messages, or installing and running a firewall. (Make It Stop PDF)

Identity Theft Prevention

Identity theft occurs when a person unlawfully obtains and uses the identity of another person to commit a fraud, theft or deception. By wrongfully acquiring another’s personal data such as social security number, mother’s maiden name, bank account number or credit card number, identity thieves can perform many acts, most commonly opening bank or credit card accounts in the victim’s name. Identity thieves are both creative and bold . . . they have even secured auto loans in the victim’s nameIdentity theft occurs when a person unlawfully obtains and uses the identity of another person to commit a fraud, theft or deception. By wrongfully acquiring another’s personal data such as social security number, mother’s maiden name, bank account number or credit card number, identity thieves can perform many acts, most commonly opening bank or credit card accounts in the victim’s name. Identity thieves are both creative and bold . . . they have even secured auto loans in the victim’s name. (PDF)