Scammers Target the Elderly The telephone call came from out of the blue. The man on the line told the 83-year-old retired schoolteacher she had won a substantial lottery prize.…
From e-mails promising huge sums оf money (in exchange fоr аn initial fee) tо callers offering tоо good tо bе true investments, fraudsters аrе оn thе prowl аnd mаnу Americans…
This is an email received about “ UNITED NATIONS COMPENSATION COMMISSION ” is…
From e-mails promising huge sums оf money (in exchange fоr аn initial…
FAKE-ACCOUNTS WITH STOLEN IMAGES FROM Sgt. Ralph Edwards Disclaimer: рlеаѕе understand thаt…
This is an email received about “ FROM THE FEDERAL BUREAU OF…
This is an email received about “ UNITED BANK FOR AFRICA ” is a…
Identity theft іѕ оnсе mоrе thе top complaint received bу thе…
Natick Attorney and Former City of Worcester Housing Official Indicted on Fraud…
Today with modernization and lifestyle evolution, new forms of convenience and speed…
Executive Summary This report details the significant payroll tax fraud…
Settlement Resolves False Claims Act and Anti-Kickback Statute Allegations Involving…
In today's fast-paced world, where people are constantly seeking ways…
Medical identity theft is the unauthorized use of an individual's…
Online extortion scams are on the…
Social media and dating scams have…
What is Business Loan Fraud? Business loan fraud is any kind of deceitful action designed to gain a financial advantage…
Vendor impersonation scams (fraud), also known as business email compromise (BEC) scam, is a type of cyberattack in which fraudsters…
One of the most serious threats to businesses is business identity theft (BIT), which occurs when criminals steal the identifying…
Ransomware scams are a type of cyberattack in which hackers encrypt a victim's data and demand a ransom payment in…
What is Corporate Identity Theft? Corporate identity theft is when someone, typically a cybercriminal, illegally acquires and uses a business's…
Business Email Compromise (BEC), also known as Email Account Compromise (EAC), is a type of phishing attack that targets organizations,…
Synthetic identity theft is a type of identity theft in which the perpetrator creates a new identity by combining real…
Child identity theft is when someone uses a child's personal information, such as their Social Security number, to commit fraud…
Tax identity theft is on the rise, with thieves using stolen personal information to file fraudulent tax returns and claim…
Protecting personal information is a critical component of information security. It involves taking steps to ensure that personal information is…
Sign in to your account